The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-45866

CVE-2023-45866: Google Android Auth Bypass Vulnerability

CVE-2023-45866 is an authentication bypass flaw in Google Android BlueZ that allows unauthenticated HID devices to inject keyboard inputs via Bluetooth. This article covers technical details, affected versions, and mitigation.

Published: February 11, 2026

CVE-2023-45866 Overview

CVE-2023-45866 is an authentication bypass vulnerability affecting Bluetooth HID (Human Interface Device) Hosts in BlueZ and multiple operating systems. The flaw allows an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection with vulnerable hosts, enabling the injection of HID keyboard reports without requiring user interaction or authorization from the Central role device.

This vulnerability represents a significant security concern for wireless device security, as it enables attackers within Bluetooth range to inject keystrokes into target devices, potentially executing arbitrary commands or facilitating further compromise.

Critical Impact

Attackers within Bluetooth radio range can pair a rogue HID device and inject keystrokes without user consent, potentially enabling command execution and system compromise across Android, iOS, macOS, Linux, and other affected platforms.

Affected Products

  • Google Android (versions 4.2.2 through 14.0)
  • Apple macOS (versions 12.6.7, 13.3.3, and others)
  • Apple iOS and iPadOS (version 16.6 and others)
  • Canonical Ubuntu Linux (18.04 LTS, 20.04, 22.04 LTS, 23.10)
  • Fedora (38, 39)
  • Debian Linux (10.0)
  • Google Pixel devices (Pixel 2, Pixel 4a, Pixel 6, Pixel 7)
  • Apple MacBook Air (2017) and MacBook Pro (M2)

Discovery Timeline

  • December 8, 2023 - CVE-2023-45866 published to NVD
  • November 4, 2025 - Last updated in NVD database

Technical Details for CVE-2023-45866

Vulnerability Analysis

This vulnerability exploits a fundamental weakness in the Bluetooth HID protocol implementation across multiple operating systems and the BlueZ Bluetooth stack. The issue lies in how Bluetooth HID Hosts handle incoming connection requests from Peripheral role HID devices. Under normal circumstances, Bluetooth pairing requires explicit user authorization before a device can establish a trusted connection. However, affected implementations fail to properly enforce this authentication requirement.

When a malicious device presents itself as a Bluetooth HID peripheral (such as a keyboard), vulnerable hosts accept the connection and begin processing HID reports without verifying that the user has authorized the pairing. This allows an attacker to inject arbitrary keyboard input into the target system, effectively gaining the ability to type commands as if they had physical access to the keyboard.

The vulnerability has a particularly wide attack surface because it affects multiple operating systems from different vendors, including Google Android, Apple macOS/iOS, and various Linux distributions using the BlueZ Bluetooth stack.

Root Cause

The root cause of CVE-2023-45866 is improper authentication validation (CWE-287) in the Bluetooth HID Host implementation. Specifically, the affected systems do not properly verify that user authorization has been granted before accepting HID keyboard reports from a newly connected Peripheral device. The BlueZ stack, as well as proprietary Bluetooth implementations in Android and Apple devices, failed to require explicit user confirmation when an HID device initiated a connection, allowing unauthenticated pairing and subsequent HID message injection.

This is related to a previous vulnerability, CVE-2020-0556, and in some cases, mitigations for that issue would have also addressed this vulnerability.

Attack Vector

The attack requires the attacker to be within Bluetooth radio range of the target device (typically up to 10 meters for Class 2 devices, or up to 100 meters for Class 1 devices). The attacker uses a specially configured Bluetooth device or software-defined radio to:

  1. Scan for vulnerable Bluetooth hosts with HID profile support enabled
  2. Initiate a connection as a Peripheral role HID device (keyboard)
  3. Establish an encrypted connection without user authorization
  4. Inject arbitrary HID keyboard reports to execute commands on the target

The attack is particularly dangerous because it requires no user interaction on the target device and can be executed silently. Once keystrokes can be injected, an attacker could open a terminal, execute malicious commands, download and run malware, or exfiltrate sensitive data.

The adjacent network attack vector means physical proximity is required, but in environments such as offices, coffee shops, conferences, or public transit, this proximity requirement is easily met.

Detection Methods for CVE-2023-45866

Indicators of Compromise

  • Unexpected Bluetooth pairing notifications or paired devices appearing in the Bluetooth device list
  • Unusual keyboard activity or commands executing without user input
  • New Bluetooth HID devices appearing in system logs without user-initiated pairing
  • Suspicious process execution or terminal activity coinciding with Bluetooth connection events

Detection Strategies

  • Monitor Bluetooth connection logs for unexpected HID device pairings, particularly keyboards appearing without user authorization
  • Implement endpoint detection rules to alert on Bluetooth pairing events followed by rapid command execution
  • Use SentinelOne's behavioral AI to detect anomalous input patterns that may indicate keystroke injection attacks
  • Review system logs for BlueZ or Bluetooth daemon entries indicating HID profile connections from unknown devices

Monitoring Recommendations

  • Enable verbose Bluetooth logging on critical systems to capture connection and pairing events
  • Configure alerts for new Bluetooth device pairings on sensitive endpoints
  • Monitor for the execution of shell commands or administrative tools immediately following Bluetooth connection events
  • Regularly audit the list of paired Bluetooth devices and remove any unauthorized entries

How to Mitigate CVE-2023-45866

Immediate Actions Required

  • Update BlueZ to the patched version containing commit 25a471a83e02e1effb15d5a488b3f0085eaeb675
  • Apply vendor security patches for affected operating systems (Apple HT214035, HT214036; Debian DSA-5584; Gentoo GLSA 202401-03)
  • Disable Bluetooth on systems where it is not required, particularly in high-security environments
  • Configure devices to require explicit user confirmation for all Bluetooth pairing attempts

Patch Information

Multiple vendors have released patches addressing CVE-2023-45866:

  • BlueZ: The fix is available in the BlueZ Git repository (commit 25a471a)
  • Apple: Security updates documented in HT214035 and HT214036
  • Debian: Patched via DSA-5584 and LTS announcement
  • Fedora: Updates available through Fedora package announcements
  • Gentoo: Security advisory GLSA 202401-03
  • Ubuntu: Patched in BlueZ package updates; see Ubuntu Changelog

Workarounds

  • Disable Bluetooth entirely on systems that do not require wireless HID connectivity
  • Set Bluetooth to non-discoverable mode when not actively pairing devices
  • Remove or unpair any unknown Bluetooth HID devices from the system
  • Implement physical security controls in environments where Bluetooth attacks may be attempted
  • Consider using wired keyboards and mice for sensitive workstations
bash
# Disable Bluetooth on Linux systems using systemctl
sudo systemctl stop bluetooth
sudo systemctl disable bluetooth

# Alternatively, block Bluetooth kernel module
echo "blacklist btusb" | sudo tee /etc/modprobe.d/bluetooth-blacklist.conf
echo "blacklist bluetooth" | sudo tee -a /etc/modprobe.d/bluetooth-blacklist.conf

# On macOS, disable Bluetooth from command line
sudo defaults write /Library/Preferences/com.apple.Bluetooth ControllerPowerState -int 0

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechGoogle Android

  • SeverityMEDIUM

  • CVSS Score6.3

  • EPSS Probability35.42%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-287
  • Technical References
  • Ubuntu Changelog for BlueZ 5.64

  • Full Disclosure Announcement #7

  • Full Disclosure Announcement #9

  • Bluetooth.org Official Site

  • GitHub CVE-2023-45866 Repository

  • Debian LTS Announcement #11

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Gentoo GLSA 202401-03

  • Apple Support Article HT214035

  • Apple Support Article HT214036

  • Debian Security DSA-5584

  • Fedora Package Announcement

  • Fedora Package Announcement
  • Vendor Resources
  • BlueZ Git Commit #25a471a
  • Related CVEs
  • CVE-2025-0086: Google Android Auth Bypass Vulnerability

  • CVE-2025-36920: Google Android Privilege Escalation Flaw

  • CVE-2026-0107: Google Android Privilege Escalation Flaw

  • CVE-2026-0108: Google Android Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English