Bluetooth Vulnerabilities

Bluetooth is one of those protocols that is off most security professional's radar because an attacker usually needs to be in very close range to intercept a BT connection.
BT vulnerabilities should be kept in mind however.
There are a number of vulnerabilities in BT.
  • BlueBorne is a vulnerability discovered in several Bluetooth implementations.
  • Btlejacking relies on the jamming vulnerability tracked as CVE-2018-7252 and affects BLE devices with versions 4.0, 4.1, 4.2 and 5.
https://cyware.com/news/latest-bluetooth-hacking-techniques-expose-new-attack-vectors-for-hackers-a16cfb5e

Connecting to a Bluetooth low energy device (BLE) apparently can be done with JavaScript.
https://evothings.com/doc/tutorials/how-to-connect-to-ble-devices.html

Comments

Popular posts from this blog

Malware Reverse Engineering

Should you hide your SSID on your Wi-Fi?

Open Whisper Systems: Signal Messaging App