CVE-2026-31773 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: May 3, 2026
Linux Kernel Bluetooth SMP - Authentication Bypass
Published: May 1, 2026Updated: May 3, 2026
Overview
Linux kernel Bluetooth SMP contains an authentication bypass caused by incorrect labeling of legacy responder STK authentication state, letting attackers bypass MITM protection, exploit requires Bluetooth pairing process.
Severity & Score
Severity: High
CVSS Score: 8.8
Impact
Attackers can bypass man-in-the-middle protection during Bluetooth pairing, potentially allowing unauthorized device access.
Mitigation
Update to the latest Linux kernel version with the fix applied.
References
- https://git.kernel.org/stable/c/667f44f1392df6482483756458c48670e579e9ff
- https://git.kernel.org/stable/c/929db734d12db41ca5f95424db4612397f1bd4a7
- https://git.kernel.org/stable/c/9a38659a3d06080715691bd3139f9c4b61f688e3
- https://git.kernel.org/stable/c/9a6d0db176f082685e0b6149700c0baf3ce2aa8b
- https://git.kernel.org/stable/c/b1c6a8e554a39b222c0879a288ea98e338fc4d77
- https://git.kernel.org/stable/c/061ee71ac6b03c9f8432fe49538c3682bfcf4cf3
- https://git.kernel.org/stable/c/0afc846bd80073ffcd2b8040f2b2fafaea3d9f72
- https://git.kernel.org/stable/c/20756fec2f0108cb88e815941f1ffff88dc286fe
Related Resources
Details
- CVE ID
- CVE-2026-31773
- Severity
- High
- CVSS Score
- 8.8
- Type
- broken_authentication
- Status
- unconfirmed
CVSS Metrics
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H