CVE-2019-9506 Encryption Key Negotiation of Bluetooth (KNOB) Vulnerability

Summary

The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.


This vulnerability only affects Bluetooth BR/EDR mode (aka. Classic mode), and does not impact Bluetooth LE mode (aka. BLE, Smart mode)

Affected Products

FortiOS is not impacted

FortiAP is not impacted

FortiAnalyzer is not impacted

FortiManager is not impacted

FortiSwitch below 6.4.0 is impacted (*)


* only FortiSwitch 424E, 426E and 448E series models under 6.0.x and 6.2.x and when their bluetooth feature been enabled and used then impacted.

Solutions

Upgrade to FortiSwitch 6.4.0


Starting from FortiSwitch 6.4.0, a new CLI option "min-key-length" was added:


config system bluetooth
set  min-key-length [length] /* default length value is 7, allow 1 to 16 */
end

system will check the "pin" length based on min-key-length setting.


Workaround:


For FortiSwitch below 6.4.0, ensure the Bluetooth pair pin length  is at least 7 characters:


config system bluetooth
set pin xxxxxxx /* ensure pin length >= 7 characters */
end


Revision History:

2020-04-17 Initial Version

2020-04-23 Detail the FortiSwitch impact models and condition.