btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
References
Link | Resource |
---|---|
https://android.googlesource.com/platform/external/bluetooth/bluedroid/+/0360aa7c418152a3e5e335a065ac3629cbb09559 | Patch Vendor Advisory |
https://android.googlesource.com/platform/external/bluetooth/bluedroid/+/0360aa7c418152a3e5e335a065ac3629cbb09559 | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 02:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://android.googlesource.com/platform/external/bluetooth/bluedroid/+/0360aa7c418152a3e5e335a065ac3629cbb09559 - Patch, Vendor Advisory |
Information
Published : 2020-02-21 02:15
Updated : 2024-11-21 02:18
NVD link : CVE-2014-7914
Mitre link : CVE-2014-7914
CVE.ORG link : CVE-2014-7914
JSON object : View
Products Affected
- android
CWE
CWE-863
Incorrect Authorization