CVE-2026-43134
Awaiting Analysis Awaiting Analysis - Queue
Bluetooth Key Size Validation Flaw in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ This adds a check for encryption key size upon receiving L2CAP_LE_CONN_REQ which is required by L2CAP/LE/CFC/BV-15-C which expects L2CAP_CR_LE_BAD_KEY_SIZE.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's Bluetooth component, specifically related to L2CAP (Logical Link Control and Adaptation Protocol). It involves a missing check for the encryption key size when processing L2CAP_LE_CONN_REQ (a connection request). The fix adds this key size check, which is required by the L2CAP/LE/CFC/BV-15-C specification and expects a specific error code (L2CAP_CR_LE_BAD_KEY_SIZE) if the key size is invalid.


How can this vulnerability impact me? :

Without the key size check, an attacker might be able to establish a Bluetooth connection using an encryption key that is too small or otherwise invalid, potentially weakening the security of the Bluetooth communication. This could lead to unauthorized access or interception of data transmitted over Bluetooth.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart