The security flaw allows for an attacker within Bluetooth range of an affected device to spoof the Bluetooth address of a previously bonded remote device, thus successfully authenticating without knowing the link key normally used for establishing an encrypted connection. “It is possible for an unauthenticated, adjacent attacker to impersonate a previously paired/bonded device and […]
Latest Comments