Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2019-2102: Bluetooth Low Energy Advisory

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft CVE-2019-2102: Bluetooth Low Energy Advisory

Severity
8
CVSS
(AV:A/AC:L/Au:N/C:C/I:C/A:C)
Published
06/11/2019
Created
06/12/2019
Added
06/11/2019
Modified
12/02/2022

Description

Executive Summary Microsoft is aware of an issue that affects the Bluetooth Low Energy (BLE) version of FIDO Security Keys. Due to a misconfiguration in the Bluetooth pairing protocols, it is possible for an attacker who is physically close to a user at the moment he/she uses the security key to communicate with the security key, or communicate with the device to which the key is paired. Google has issued CVE-2019-2102 for this vulnerability. To address this issue, Microsoft has blocked the pairing of these Bluetooth Low Energy (BLE) keys with the pairing misconfiguration. Recommended Actions Microsoft recommends that customers install the June security update for Windows. Customers using the Bluetooth Low Energy (BLE) version of the Titan Security Key by Google should review Android’s June Bulletins and Google’s advisory and take appropriate action. Customers using the Feitian Multipass (Feitian CTAP1/U2F Security Key) should review Feitian's Product Issue Notification website and take appropriate action.

Solution(s)

  • msft-kb4503263-3f49e638-6f8c-47cd-a1cd-255c6ae917ba
  • msft-kb4503263-bce6e093-7a69-4f5b-9b2a-c4861df34e7b
  • msft-kb4503263-f3463e84-9007-4118-b515-eba972697202
  • msft-kb4503267-9d442aa2-8250-4bce-a4cb-d5c0f0e940c3
  • msft-kb4503286-dc868304-9b1c-482e-829c-8015cac2e793
  • msft-kb4503290-1a32764d-38ac-46c1-95fd-1bbb92147e05
  • msft-kb4503290-5b6fe378-dbd0-47a5-b088-1b2c530fdc58
  • msft-kb4503290-b489422c-7cde-4048-b72d-6ba8cfeb9ea5
  • msft-kb4503293-c6d3d33b-8eca-4003-9755-d7eb5e197ac7
  • msft-kb4503327-664d546e-67b3-43f1-b1f9-4e240a41b6a5

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;