PatchSiren cyber security CVE debrief
CVE-2026-43334 Git CVE debrief
CVE-2026-43334 is a Linux kernel Bluetooth SMP flaw in which the responder could build a pairing response before fully enforcing its local high-security MITM requirement. That mismatch could let later pairing-method selection follow a weaker path than intended, until the response is corrected to carry the MITM bit consistently.
- Vendor
- Git
- Product
- Unknown
- CVSS
- HIGH 8.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-08
- Original CVE updated
- 2026-05-11
- Advisory published
- 2026-05-08
- Advisory updated
- 2026-05-11
Who should care
Linux kernel and distro maintainers, Bluetooth stack integrators, OEMs shipping Bluetooth-enabled devices, and security teams that rely on Bluetooth pairing with BT_SECURITY_HIGH requirements.
Technical summary
According to the supplied description, smp_cmd_pairing_req() used the initiator’s auth_req to construct the pairing response before enforcing the responder’s local BT_SECURITY_HIGH policy. If the initiator did not request SMP_AUTH_MITM, the responder’s response could also omit it, and tk_request() might then select JUST_CFM even though the local policy required MITM. The fix is to first confirm that MITM is achievable from the IO capabilities and then force SMP_AUTH_MITM into both rsp.auth_req and auth when the local side requires HIGH security, keeping policy enforcement and later method selection aligned.
Defensive priority
High priority. The issue is rated CVSS 8.8 HIGH in the supplied data and affects authentication-policy handling during Bluetooth pairing, with an adjacent-network attack surface.
Recommended defensive actions
- Apply the Linux kernel update that contains the fix for CVE-2026-43334.
- Prioritize updates on systems that use Bluetooth pairing in environments requiring high security or authenticated pairing.
- Verify downstream kernel, distro, and vendor backports that include the MITM enforcement change.
- Retest Bluetooth pairing flows after patching to confirm MITM-required devices still negotiate as expected and that weaker pairing paths are rejected when policy demands it.
Evidence notes
This debrief is based on the supplied CVE description, NVD metadata, and kernel.org stable references. The CVE was published at 2026-05-08T14:16:43.130Z and modified at 2026-05-11T08:16:09.977Z. NVD metadata in the source corpus lists CVSS 3.1 AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H and vulnStatus Received. No affected version range was provided in the source corpus, so this summary avoids version-specific claims.
Official resources
-
CVE-2026-43334 CVE record
CVE.org
-
CVE-2026-43334 NVD detail
NVD
-
Source item URL
nvd_modified
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
-
Source reference
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Public CVE published 2026-05-08 and modified 2026-05-11. No further disclosure timeline was supplied in the corpus.