CVE-2022-0204
📋 TL;DR
CVE-2022-0204 is a heap overflow vulnerability in BlueZ Bluetooth stack versions before 5.63. An attacker on the local network can send specially crafted files to cause denial of service through application crashes. Systems using BlueZ for Bluetooth functionality are affected.
💻 Affected Systems
- BlueZ Bluetooth stack
📦 What is this software?
Bluez by Bluez
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service of Bluetooth services, potentially disrupting device connectivity and functionality.
Likely Case
Application crashes leading to temporary Bluetooth service disruption until services restart.
If Mitigated
Minimal impact with proper network segmentation and updated software.
🎯 Exploit Status
Exploitation requires local network access and ability to send specially crafted files to BlueZ services.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: BlueZ 5.63 and later
Vendor Advisory: https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
Restart Required: Yes
Instructions:
1. Update BlueZ to version 5.63 or later using your distribution's package manager. 2. Restart Bluetooth services. 3. Verify the update was successful.
🔧 Temporary Workarounds
Disable Bluetooth if not needed
linuxTemporarily disable Bluetooth services to prevent exploitation
sudo systemctl stop bluetooth
sudo systemctl disable bluetooth
Network segmentation
allIsolate Bluetooth devices on separate network segments
🧯 If You Can't Patch
- Implement strict network access controls to limit who can access Bluetooth services
- Monitor for unusual Bluetooth service crashes or restart patterns
🔍 How to Verify
Check if Vulnerable:
Check BlueZ version with: bluetoothd --version
Check Version:
bluetoothd --version || bluetoothctl --version
Verify Fix Applied:
Verify version is 5.63 or higher and test Bluetooth functionality
📡 Detection & Monitoring
Log Indicators:
- Unexpected Bluetooth service crashes in system logs
- Multiple Bluetooth service restarts
Network Indicators:
- Unusual Bluetooth file transfer attempts from unknown sources
SIEM Query:
source="systemd" "bluetooth" AND ("crash" OR "segfault" OR "restart")
🔗 References
- https://bugzilla.redhat.com/show_bug.cgi?id=2039807
- https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0
- https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
- https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html
- https://security.gentoo.org/glsa/202209-16
- https://bugzilla.redhat.com/show_bug.cgi?id=2039807
- https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0
- https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
- https://lists.debian.org/debian-lts-announce/2022/10/msg00026.html
- https://lists.debian.org/debian-lts-announce/2024/09/msg00022.html
- https://security.gentoo.org/glsa/202209-16