At the Bluetooth SIG, we strive to make Bluetooth the global standard for simple, secure wireless connectivity and security is of the utmost importance.  If you have found a potential security issue in any Bluetooth specification, please contact us via email at [email protected].  For encrypted communication, you may use our public key.

We do our best to respond to security issues within 48 hours, but if you do not receive a response within this time frame, please feel free to follow up with us to ensure that we have received your original report.

Report Details
The following information will help us to evaluate your submission as quickly as possible. If available, please include in your report:

  • Vulnerability type (security, privacy, availability/DoS, etc.)
  • Affected specification and version
  • Instructions to reproduce the issue
  • A proof-of-concept (PoC)

Bluetooth Security Notices

Vulnerability Publication Date Details Specifications Affected CVE [NVD]
SUPPLEMENT: Impersonation in the Passkey Entry Protocol 19/09/2024 SIG Security Notice Core Spec v2.1 to 5.4 CVE-2021-37577
BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses 27/11/2023 SIG Security Notice Core Spec v4.2 to 5.2 CVE-2023-24023
Pairing Mode Confusion in BLE Passkey Entry 09/12/2022 SIG Security Notice Core Spec v4.0 to 5.3 CVE-2022-25836
Pairing Mode Confusion in BR/EDR 09/12/2022 SIG Security Notice Core Spec v1.0B to 5.3 CVE-2022-25837
InjectaBLE: Injecting malicious traffic into established Bluetooth Low Energy connections 21/06/2021 SIG Security Notice Core Spec, v4.0 to 5.2 CVE-2021-31615
Bluetooth Mesh Profile AuthValue leak 24/05/2021 SIG Security Notice Mesh Profile Spec, v1.0 to v1.0.1 CVE-2020-26559
Malleable commitment in Bluetooth Mesh Profile provisioning 24/05/2021 SIG Security Notice Mesh Profile Spec, v1.0 to v1.0.1 CVE-2020-26556
Predictable Authvalue in Bluetooth Mesh Profile provisioning leads to MITM 24/05/2021 SIG Security Notice Mesh Profile Spec, v1.0 to v1.0.1 CVE-2020-26557
Impersonation attack in Bluetooth Mesh Profile provisioning 24/05/2021 SIG Security Notice Mesh Profile Spec, v1.0 to v1.0.1 CVE-2020-26560
Impersonation in the BR/EDR pin-pairing protocol 24/05/2021 SIG Security Notice Core Spec, v1.0B to 5.2 CVE-2020-26555
Authentication of the Bluetooth LE legacy-pairing protocol 24/05/2021 SIG Security Notice Core Spec, v4.0 to 5.2 N/A
Impersonation in the Passkey entry protocol 24/05/2021 SIG Security Notice Core Spec, v2.1 to 5.2 CVE-2020-26558
Exploiting Cross-Transport Key Derivation 09/09/2020 SIG Security Notice Core Spec, v4.2 to 5.0 CVE-2020-15802
Pairing Method Confusion 18/05/2020 SIG Security Notice

Core Spec, v2.1 to v5.2

CVE-2020-10134
Bluetooth Impersonation Attacks 18/05/2020 SIG Security Notice

Core Spec, v2.1 to v5.2

CVE-2020-10135
Key Negotiation of Bluetooth 13/08/2019 SIG Security Notice Core Spec, v4.2, v5.0 and v5.1 CVE-2019-9506
Validation of Elliptic Curve Parameters 23/07/2018 SIG Security Notice Core Spec, v2.1 to v5.0 CVE-2018-5383
NOTICE: The Bluetooth SIG updated its Terms of Use on 29 October 2024Learn more
 Get Help