Devices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Transport Key Derivation in Bluetooth Core Specification v4.2 and v5.0 may permit an unauthenticated user to establish a bonding with one transport, either LE or BR/EDR, and replace a bonding already established on the opposing transport, BR/EDR or LE, potentially overwriting an authenticated key with an unauthenticated key, or a key with greater entropy with one with less.
- https://gizmodo.com/bluetooth-unveils-its-latest-security-issue-with-no-se-1845013709
- https://github.com/404notf0und/CVE-Flow
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CerberusMrX/Advanced-Bluetooth-Penetration-Testing-Tool
- https://github.com/Charmve/BLE-Security-Attack-Defence
- https://github.com/Essen-Lin/Practice-of-the-Attack-and-Defense-of-Computers_Project2
- https://github.com/JeffroMF/awesome-bluetooth-security321
- https://github.com/Live-Hack-CVE/CVE-2020-15802
- https://github.com/TinyNiko/android_bulletin_notes
- https://github.com/WinMin/Protocol-Vul
- https://github.com/engn33r/awesome-bluetooth-security
- https://github.com/francozappa/blur
- https://github.com/goblimey/learn-unix
- https://github.com/sgxgsx/BlueToolkit