CVE-2023-2002
Linux Kernel vulnerability analysis and mitigation

Overview

A vulnerability (CVE-2023-2002) was discovered in the HCI sockets implementation of the Linux Kernel's Bluetooth subsystem, specifically due to a missing capability check in net/bluetooth/hci_sock.c. The vulnerability was discovered by Ruihan Li and disclosed on April 16, 2023. This flaw affects Linux kernel versions prior to 6.4 and became exploitable after commit f81f5b2db869 (introduced in kernel v4.9) (Openwall OSS).

Technical details

The vulnerability stems from an insufficient permission check in the Bluetooth subsystem when handling ioctl system calls of HCI sockets. The implementation only verifies the CAPNETADMIN capability of the calling task, not the socket opener. This allows tasks without proper CAPNETADMIN capability to mark HCI sockets as trusted, which enables sending and receiving of management commands and events. The exploitation requires only the presence of commonly used setuid programs (e.g., su, sudo) and can be triggered through ioctl calls for tty parameters on HCI sockets (Openwall OSS).

Impact

When successfully exploited, this vulnerability can compromise the confidentiality, integrity, and availability of Bluetooth communication. Attackers can exploit this vulnerability to pair the controller with malicious devices (even if Bluetooth service is disabled), prevent specific devices from being paired, or read sensitive information such as OOB data (Openwall OSS).

Mitigation and workarounds

A patch has been developed that replaces capable() with skcapable(), which checks both the current task and the socket opener for the required capability. Additionally, another patch hardens the ioctl processing logic by checking command validity at the start of hcisock_ioctl(). As a workaround, if Bluetooth devices are not being used, they can be blocked using rfkill to prevent devices from being powered up, which will significantly reduce the vulnerability's impact (Openwall OSS).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40344N/AN/A
  • Linux KernelLinux Kernel
  • kernel-debug-modules-internal
NoYesDec 09, 2025
CVE-2025-40343N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel
NoYesDec 09, 2025
CVE-2025-40342N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-devel-matched
NoYesDec 09, 2025
CVE-2025-40341N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-modules-extra
NoYesDec 09, 2025
CVE-2025-40340N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-kvm
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management