Researchers from IoT security company Armis have recently discovered eight security vulnerabilities that affect an estimated 5.3 billion Bluetooth implementations.

They also discovered that the collection of vulnerabilities, codenamed “BlueBorne” cannot be addressed by traditional security solutions. There is also no need for an attacker to pair with the device or interact with the user to exploit the BlueBorne flaws.

Using BlueBorne, an attacker can run malicious code or Man-In-The-Middle attacks, and take control of Bluetooth-enabled devices running Android, iOS, Microsoft, and even Linux.

 

Source: Bleeping Computer

Leave a Comment

Your email address will not be published. Required fields are marked *