{"id":"CVE-2020-15802","details":"Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, either LE or BR/EDR, and replace a bonding already established on the opposing transport, BR/EDR or LE, potentially overwriting an authenticated key with an unauthenticated key, or a key with greater entropy with one with less.","aliases":["A-158854097","ASB-A-158854097"],"modified":"2026-03-15T14:38:11.269403Z","published":"2020-09-11T14:15:11.317Z","references":[{"type":"ADVISORY","url":"https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/bluetooth-security/blurtooth/"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/589825"},{"type":"ADVISORY","url":"https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-15802.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}