NewStart CGSL CORE 5.05 / MAIN 5.05 : bluez Multiple Vulnerabilities (NS-SA-2021-0162)

high Nessus Plugin ID 154554

Synopsis

The remote NewStart CGSL host is affected by multiple vulnerabilities.

Description

The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has bluez packages installed that are affected by multiple vulnerabilities:

- A bug in Bluez may allow for the Bluetooth Discoverable state being set to on when no Bluetooth agent is registered with the system. This situation could lead to the unauthorized pairing of certain Bluetooth devices without any form of authentication. Versions before bluez 5.51 are vulnerable. (CVE-2018-10910)

- Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access (CVE-2020-0556)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade the vulnerable CGSL bluez packages. Note that updated packages may not be available yet. Please contact ZTE for more information.

See Also

http://security.gd-linux.com/notice/NS-SA-2021-0162

http://security.gd-linux.com/info/CVE-2018-10910

http://security.gd-linux.com/info/CVE-2020-0556

Plugin Details

Severity: High

ID: 154554

File Name: newstart_cgsl_NS-SA-2021-0162_bluez.nasl

Version: 1.3

Type: local

Published: 10/27/2021

Updated: 11/27/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-0556

CVSS v3

Risk Factor: High

Base Score: 7.1

Temporal Score: 6.4

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:zte:cgsl_core:bluez, p-cpe:/a:zte:cgsl_core:bluez-cups, p-cpe:/a:zte:cgsl_core:bluez-hid2hci, p-cpe:/a:zte:cgsl_core:bluez-libs, p-cpe:/a:zte:cgsl_core:bluez-libs-devel, p-cpe:/a:zte:cgsl_main:bluez, p-cpe:/a:zte:cgsl_main:bluez-cups, p-cpe:/a:zte:cgsl_main:bluez-hid2hci, p-cpe:/a:zte:cgsl_main:bluez-libs, p-cpe:/a:zte:cgsl_main:bluez-libs-devel, cpe:/o:zte:cgsl_core:5, cpe:/o:zte:cgsl_main:5

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/ZTE-CGSL/release, Host/ZTE-CGSL/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/24/2021

Vulnerability Publication Date: 1/28/2019

Reference Information

CVE: CVE-2018-10910, CVE-2020-0556