A bunch of Bluetooth vulnerabilities are being reported, some pretty nasty.
BlueBorne concerns us because of the medium by which it operates. Unlike the majority of attacks today, which rely on the internet, a BlueBorne attack spreads through the air. This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus.
The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device and require another step to take control of the device. With BlueBorne, attackers can gain full control right from the start.
Leave a reply