A series of vulnerabilities recently found in the Bluetooth communication protocol, used by billions of smartphones, laptops, PCs, and IoT devices around the world, could be exploited by attackers to compromise popular operating systems without any interaction from the user.
By compromising the Bluetooth communication protocol, over-the-air, an attacker could perform man-in-the-middle attacks or remotely execute malicious code on a victim’s device to gain full remote control of the device. Operating systems such as Windows, Linux, Android, and iOS are affected, and security researchers at Armis – who discovered the vulnerability – suggest the attack is completely undetectable.
Leave a reply