Blueborne [Bluetooth exploit]

For general computer discussion & help, come here

Moderators: EvilHomer3k, Bakhtosh

Post Reply
User avatar
Posts: 5291
Joined: Wed Oct 13, 2004 3:51 am
Location: Map Ref 47.6°N 122.35°W
Battlefinch’s avatar

Blueborne [Bluetooth exploit]

Post by hitbyambulance » Tue Sep 19, 2017 5:57 pm ... nerability
An attack scenario includes an adversary identifying Bluetooth devices nearby and using commonly tools to identify the MAC address of vulnerable Bluetooth devices.

“By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly. The attacker will then exploit a vulnerability in the implementation of the Bluetooth protocol in the relevant platform and gain the access he needs to act on his malicious objective,” researchers wrote.

At this stage the attacker can choose to create a Man-in-the-Middle attack and control the device’s communication, or take full control over the device and use it for a wide array of cybercriminal purposes, researchers stated.
good luck getting billions of legacy devices patched (hint: they're not)

User avatar
Posts: 14063
Joined: Fri Mar 04, 2005 11:43 pm
Location: Dallas-ish

Re: Blueborne [Bluetooth exploit]

Post by coopasonic » Wed Sep 20, 2017 1:53 pm

Crap. I need to patch my deadbolt. If I ever thought I would have to patch my front door, this is not the sort of patching I was imagining.

Post Reply