The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-26555

CVE-2020-26555: Bluetooth Core Auth Bypass Vulnerability

CVE-2020-26555 is an authentication bypass flaw in Bluetooth Core Specification that allows attackers to spoof device addresses and complete pairing without PIN knowledge. This article covers technical details, affected versions, and mitigations.

Published: March 4, 2026

CVE-2020-26555 Overview

CVE-2020-26555 is an authorization bypass vulnerability affecting the Bluetooth legacy BR/EDR (Basic Rate/Enhanced Data Rate) PIN code pairing mechanism in Bluetooth Core Specification versions 1.0B through 5.2. This vulnerability enables an unauthenticated attacker within Bluetooth range to spoof the BD_ADDR (Bluetooth Device Address) of a peer device and complete the pairing process without knowledge of the required PIN code.

The flaw exists in how the legacy Bluetooth pairing protocol handles device authentication, allowing attackers to impersonate legitimate devices during the pairing handshake. This represents a fundamental weakness in the Bluetooth specification itself rather than a specific implementation flaw, meaning all devices supporting legacy BR/EDR pairing are potentially affected.

Critical Impact

An attacker within adjacent network proximity can spoof Bluetooth device addresses to bypass PIN authentication and pair with victim devices, potentially enabling unauthorized access, data interception, or device compromise.

Affected Products

  • Bluetooth Core Specification versions 1.0B through 5.2
  • Intel AX210, AX201, AX200 Wireless Adapters and Firmware
  • Intel AC 9560, AC 9462, AC 9461, AC 9260, AC 8265, AC 8260 Adapters and Firmware
  • Intel AC 3168, AC 7265, AC 3165 Adapters and Firmware
  • Intel Killer Wi-Fi 6E AX1675, Killer Wi-Fi 6 AX1650, Killer AC 1550 Adapters and Firmware
  • Fedora 34

Discovery Timeline

  • May 24, 2021 - CVE-2020-26555 published to NVD
  • November 4, 2025 - Last updated in NVD database

Technical Details for CVE-2020-26555

Vulnerability Analysis

This vulnerability stems from improper authorization (CWE-863) in the Bluetooth legacy BR/EDR PIN code pairing protocol. The attack requires the adversary to be within adjacent network (Bluetooth) range of the target device, but does not require user interaction or prior privileges to execute.

The vulnerability allows an attacker to complete the pairing process without possessing the legitimate PIN code by exploiting the protocol's failure to adequately verify the authenticity of the peer device's BD_ADDR during the pairing handshake. This enables device impersonation attacks that can lead to unauthorized device pairing, partial confidentiality compromise, and integrity violations on the affected Bluetooth connection.

The impact is limited to partial confidentiality and integrity compromise rather than complete system takeover, as the attacker gains access through an improperly authenticated Bluetooth pairing rather than direct system access.

Root Cause

The root cause lies in the Bluetooth Core Specification's legacy BR/EDR PIN code pairing mechanism, which does not adequately authenticate the BD_ADDR presented by devices during the pairing process. The protocol assumes the device presenting a BD_ADDR is the legitimate owner of that address, without cryptographic verification of this claim. This allows an attacker to observe or guess a target device's BD_ADDR and then impersonate that device during pairing negotiations with another device.

Attack Vector

The attack requires adjacent network proximity (Bluetooth range), which typically extends 10-100 meters depending on the device class and environment. An attacker would:

  1. Identify a target Bluetooth device and capture its BD_ADDR through Bluetooth scanning
  2. Wait for or trigger a pairing attempt between the target device and another device
  3. Spoof the BD_ADDR of the target device and engage in the pairing protocol
  4. Complete the pairing without knowledge of the PIN by exploiting the verification weakness

The vulnerability does not require user interaction on the victim devices, making it particularly concerning for devices that accept pairing requests automatically or without strong user confirmation mechanisms.

The technical details of this vulnerability involve protocol-level weaknesses in the Bluetooth specification. For comprehensive technical analysis, refer to the CERT Vulnerability Advisory #799380 and the Intel Security Advisory SA-00520.

Detection Methods for CVE-2020-26555

Indicators of Compromise

  • Unexpected or unauthorized Bluetooth device pairings appearing in device pairing lists
  • Multiple pairing attempts from devices with identical or similar BD_ADDR values
  • Bluetooth pairing events occurring without user-initiated pairing requests
  • Anomalous Bluetooth traffic patterns indicating spoofed device addresses

Detection Strategies

  • Monitor Bluetooth pairing logs for unexpected device connections or repeated failed pairing attempts
  • Implement endpoint detection rules that alert on new Bluetooth device pairings, especially on sensitive systems
  • Use network and device monitoring solutions to track Bluetooth device inventories and flag unauthorized additions
  • Review system logs for Bluetooth service events that indicate pairing without proper user authorization

Monitoring Recommendations

  • Enable verbose Bluetooth logging on critical systems to capture pairing events and device connection details
  • Implement centralized logging for Bluetooth-enabled enterprise devices to correlate suspicious pairing activities
  • Deploy SentinelOne endpoint protection with behavioral analysis to detect anomalous device pairing patterns
  • Conduct periodic audits of paired Bluetooth devices across enterprise endpoints

How to Mitigate CVE-2020-26555

Immediate Actions Required

  • Disable legacy BR/EDR PIN code pairing and enforce Secure Simple Pairing (SSP) or LE Secure Connections where supported
  • Disable Bluetooth on devices where it is not required for business operations
  • Implement strict Bluetooth visibility policies to limit device discoverability
  • Review and remove any unauthorized or unknown paired Bluetooth devices from all systems

Patch Information

Vendors have released firmware updates to address this vulnerability. Intel has issued Security Advisory SA-00520 with guidance for affected Intel wireless adapters. Fedora has released a package update addressing the vulnerability. Check with your Bluetooth device manufacturers for specific firmware updates.

For the core specification issue, the Bluetooth SIG has published guidance through their Security Reporting portal.

Workarounds

  • Configure devices to require Secure Simple Pairing (SSP) instead of legacy PIN-based pairing
  • Set Bluetooth devices to non-discoverable mode when not actively pairing
  • Require user confirmation for all Bluetooth pairing attempts
  • Implement physical security controls to limit attacker proximity to sensitive Bluetooth-enabled devices
  • Consider using Bluetooth Low Energy (BLE) with LE Secure Connections for newer deployments
bash
# Example: Disable legacy pairing on Linux systems (BlueZ)
# Edit /etc/bluetooth/main.conf
[General]
# Disable legacy pairing
ClassicBondedOnly = true

# Require Secure Simple Pairing
SecureConnections = true

# Disable automatic pairing
AutoEnable = false

# Restart Bluetooth service
sudo systemctl restart bluetooth

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechBluetooth

  • SeverityMEDIUM

  • CVSS Score5.4

  • EPSS Probability0.20%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-863
  • Technical References
  • CERT Vulnerability Advisory #799380

  • Fedora Package Announcement

  • Intel Security Advisory SA-00520

  • CERT Vulnerability Advisory #799380
  • Vendor Resources
  • Bluetooth Security Reporting Guide
  • Related CVEs
  • CVE-2020-26559: Bluetooth Mesh Profile Auth Bypass Flaw

  • CVE-2020-26558: Bluetooth Core Auth Bypass Vulnerability

  • CVE-2020-26556: Bluetooth Core Auth Bypass Vulnerability

  • CVE-2020-15802: Bluetooth Core Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English