Researchers identified a security vulnerability related to encryption on Bluetooth BR/EDR connections. Researchers identified that it is possible for an attacking device to interfere with the procedure used to set up encryption on a connection between two devices in such a way as to reduce the length of the encryption key used. Bluetooth products exist in the field that may not currently perform the required step to verify the negotiated encryption key meets the minimum length. There is no evidence that the vulnerability has been exploited maliciously and the Bluetooth SIG is not aware of any devices implementing the attack having been developed.”]

