good luck getting billions of legacy devices patched (hint: they're not)An attack scenario includes an adversary identifying Bluetooth devices nearby and using commonly tools to identify the MAC address of vulnerable Bluetooth devices.
“By probing the device, the attacker can determine which operating system his victim is using, and adjust his exploit accordingly. The attacker will then exploit a vulnerability in the implementation of the Bluetooth protocol in the relevant platform and gain the access he needs to act on his malicious objective,” researchers wrote.
At this stage the attacker can choose to create a Man-in-the-Middle attack and control the device’s communication, or take full control over the device and use it for a wide array of cybercriminal purposes, researchers stated.
For general computer discussion & help, come here
2 posts • Page 1 of 1
- Posts: 5291
- Joined: Wed Oct 13, 2004 3:51 am
- Location: Map Ref 47.6°N 122.35°W
https://www.androidcentral.com/lets-tal ... nerability