Multiple vulnerabilities are found in Bluetooth devices that support the Bluetooth Core and Mesh Specifications. An attacker within wireless range of the vulnerable Bluetooth devices could use a specially crafted device to exploit the vulnerabilities.
Depending on the vulnerability exploited, a successful attack could lead to impersonation attack, AuthValue disclosure or man-in-the-middle attack.
System administrators and users should check with their product vendors to confirm if their devices are affected and the availability of patches. System administrators and users should apply the patches or follow the recommendations provided by the product vendors to mitigate the risk.
List of affected vendors are made available in the following URL:
https://www.kb.cert.org/vuls/id/799380