CVE-2026-43134
Bluetooth Key Size Validation Flaw in Linux Kernel
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's Bluetooth component, specifically related to L2CAP (Logical Link Control and Adaptation Protocol). It involves a missing check for the encryption key size when processing L2CAP_LE_CONN_REQ (a connection request). The fix adds this key size check, which is required by the L2CAP/LE/CFC/BV-15-C specification and expects a specific error code (L2CAP_CR_LE_BAD_KEY_SIZE) if the key size is invalid.
How can this vulnerability impact me? :
Without the key size check, an attacker might be able to establish a Bluetooth connection using an encryption key that is too small or otherwise invalid, potentially weakening the security of the Bluetooth communication. This could lead to unauthorized access or interception of data transmitted over Bluetooth.