Bluetooth Vulnerabilities
Bluetooth is one of those protocols that is off most security professional's radar because an attacker usually needs to be in very close range to intercept a BT connection.
BT vulnerabilities should be kept in mind however.
There are a number of vulnerabilities in BT.
Connecting to a Bluetooth low energy device (BLE) apparently can be done with JavaScript.
https://evothings.com/doc/tutorials/how-to-connect-to-ble-devices.html
BT vulnerabilities should be kept in mind however.
There are a number of vulnerabilities in BT.
- BlueBorne is a vulnerability discovered in several Bluetooth implementations.
- Btlejacking relies on the jamming vulnerability tracked as CVE-2018-7252 and affects BLE devices with versions 4.0, 4.1, 4.2 and 5.
Connecting to a Bluetooth low energy device (BLE) apparently can be done with JavaScript.
https://evothings.com/doc/tutorials/how-to-connect-to-ble-devices.html
Comments
Post a Comment