Unauthenticated Injection of HID Messages via Bluetooth HID Hosts in BlueZ
CVE-2023-45866
Key Information:
Badges
What is CVE-2023-45866?
CVE-2023-45866 is a vulnerability affecting the BlueZ Bluetooth protocol stack, which is integral for enabling Bluetooth communication on Linux systems. This vulnerability allows unauthenticated Bluetooth Human Interface Device (HID) peripherals to initiate and establish encrypted connections, thus permitting the injection of HID messages without user interaction. Such exploitation could lead to unauthorized keystroke injections, compromising the security of the system and enabling potential malicious activities.
Technical Details
The issue lies within the Bluetooth HID Hosts in BlueZ, where an unauthenticated peripheral can connect and send HID keyboard reports without requiring any validation from the central device. This flaw is present in specific versions of BlueZ, including bluez 5.64-0ubuntu1, commonly deployed in Ubuntu 22.04 LTS environments. The vulnerability poses significant concerns, especially in scenarios where robust access controls or user approvals are expected.
Potential Impact of CVE-2023-45866
-
Unauthorized Access and Control: Exploitation can allow attackers to send keystrokes and commands to the system, leading to unauthorized actions that could compromise sensitive data or system integrity.
-
Data Breaches: By injecting malicious inputs, attackers may retrieve sensitive information or plant malicious software, increasing the risk of data breaches and manipulation of system resources.
-
User Trust Erosion: The ability for attackers to manipulate system input without user consent undermines trust in Bluetooth technology, potentially leading to widespread security concerns across various industries employing Bluetooth-enabled devices.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles

Critical Bluetooth security flaw discovered in Google, Apple and Linux devices - SiliconANGLE
Critical Bluetooth security flaw discovered in Google, Apple and Linux devices - SiliconANGLE

Bluetooth Vulnerability Enables Keystroke Injection on Android, Linux, macOS, iOS
Another day, another Bluetooth vulnerability impacting billions of devices worldwide!
This Bluetooth security flaw could be used to hijack Apple and Linux devices
Experts uncover new way to trick devices via Bluetooth
References
EPSS Score
30% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- π
Vulnerability started trending
- πΎ
Exploit known to exist
Vulnerability published
- π°
First article discovered by Theregister
Vulnerability Reserved