vulnerability
Arch Linux: Access restriction bypass (CVE-2020-0556)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:A/AC:L/Au:N/C:P/I:P/A:P) | Mar 12, 2020 | Jul 11, 2025 | Nov 27, 2025 |
Severity
6
CVSS
(AV:A/AC:L/Au:N/C:P/I:P/A:P)
Published
Mar 12, 2020
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
It was discovered that the HID and HOGP profiles implementations in bluez before 5.54 don't specifically require bonding between the device and the host. This creates an opportunity for a malicious device to connect to a target host to either impersonate an existing HID device without security or to cause an SDP or GATT service discovery to take place which would allow HID reports to be injected to the input subsystem from a non-bonded source.
This potentially enables an unauthenticated attacker with adjacent access to impersonate an existing HID device, cause a denial of service or escalate privileges.
This potentially enables an unauthenticated attacker with adjacent access to impersonate an existing HID device, cause a denial of service or escalate privileges.
Solution
arch-linux-upgrade-latest
References
- CVE-2020-0556
- https://attackerkb.com/topics/CVE-2020-0556
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00008.html
- URL-http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00055.html
- URL-https://lists.debian.org/debian-lts-announce/2020/06/msg00008.html
- URL-https://security.archlinux.org/ASA-202003-13
- URL-https://security.gentoo.org/glsa/202003-49
- URL-https://usn.ubuntu.com/4311-1/
- URL-https://www.debian.org/security/2020/dsa-4647
- URL-https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html
- URL-https://www.openwall.com/lists/oss-security/2020/03/12/4
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.