Files
CVEs-PoC/2021/CVE-2021-1683.md
2025-09-29 21:09:30 +02:00

36 lines
2.7 KiB
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters
This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
### [CVE-2021-1683](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1683)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201507&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201607&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201803&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201809&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201909&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%202004&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%2020H2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%208.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%202004&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%20version%2020H2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%2C%20version%201909%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=10.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.3.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Security%20Feature%20Bypass&color=brightgreen)
### Description
Microsoft is aware of the "Impersonation in the Passkey Entry Protocol" vulnerability. For more information regarding the vulnerability, please see thisstatementfrom the Bluetooth SIG.To address the vulnerability, Microsoft has released a software update that will fail attempts to pair if the remote device exchanges a public key with the same X coordinate as the locally exchanged public key
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/pawan-shivarkar/List-of-CVE-s-
- https://github.com/pawan-shivarkar/pawan-shivarkar