Bluetooth Control Vulnerability in Tizen Operating System by Samsung
CVE-2018-16265
6.5MEDIUM
Summary
The bt/bt_core system service in Tizen operating system is vulnerable due to incorrect D-Bus security policy configurations. This vulnerability enables unauthorized processes to create a user interface for the system, thereby gaining control over the Bluetooth pairing process. Affected versions include Tizen before 5.0 M1 and Tizen-based firmware on devices like Samsung Galaxy Gear series prior to build RE2. This flaw poses significant risks as it allows attackers to exploit Bluetooth functionalities without appropriate permissions.
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved