These critical Bluetooth vulnerabilities allow hackers to impersonate legitimate devices
Successful exploitation of Bluetooth vulnerabilities found and reported by researchers from the Agence nationale de la cheurité des systèmes d'information (ANSSI) could allow attackers to perform MitM attacks within wireless micro of vulnerable devices.
Earlier today, the Bluetooth Special Interest Group (Bluetooth SIG), the organization that oversees the development of Bluetooth standards, also released security advice and recommendations for each of the seven security flaws. affects two vulnerable specification.
Details of the discovered vulnerabilities, including the affected Bluetooth specification and link to the Bluetooth SIG recommendations and advisories, are shown in the table below.
'The Bluetooth SIG is also making the details of this vulnerability and remedial measures widely available to our member companies and is encouraging them to quickly integrate any needed patches. Which device' - organize information. "As always, Bluetooth users should ensure they have installed the latest updates recommended by device and operating system manufacturers."
According to the Carnegie Mellon CERT Coordination Center (CERT/CC), the Android Open Source Project (AOSP), Cisco, Intel, Red Hat, Microchip Technology, and Cradlepoint are companies whose products are affected by these vulnerabilities.
AOSP is working hard to publish security updates to address vulnerabilities CVE-2020-26555 and CVE-2020-26558 affecting Android devices.
"Android has assessed this issue as high severity for the Android operating system and will release a patch for this vulnerability in an upcoming Android security bulletin," AOSP told CERT/CC.
Cisco is also working to patch issues CVE-2020-26555 and CVE-2020-26558 affecting its products.
"Cisco is monitoring these vulnerabilities through issue PSIRT-0503777710," the company said. "Cisco has investigated the impact of the aforementioned Bluetooth specification vulnerabilities and is currently waiting for all teams to release them. individual product developers provide Software fixes to address them".
Although affected by a number of vulnerabilities, Intel, Red Hat, and Cradlepoint did not provide information to CERT/CC prior to the vulnerability being disclosed.
You should read it
- New series of Bluetooth vulnerabilities discovered that could put millions of Windows and Android devices worldwide in trouble
- Desktop without Bluetooth? This is the solution
- Billions of devices are affected by the new Bluetooth attack
- What is Bluetooth 5.0? What benefits does it have for our lives?
- Instructions for using Bluetooth on devices
- Do you know what Bluetooth on TV is for?
- Top 6 USB Bluetooth for the best PC
- The 'Bluetooth 4.2' technology standard was released
May be interested
- GitLab patches critical vulnerability that allows hackers to take control of accountsgitlab has just resolved a critical vulnerability that could allow hackers to take over users' accounts with hard-coded passwords. it is worth mentioning here that the hacker can perform the attack remotely.
- How to find lost Bluetooth devicesbluetooth devices with more and more compact designs mean they are also easier to lose
- How to set up and manage Bluetooth devices in Windowsmany pc users have switched to bluetooth mice and keyboards, not to mention wireless bluetooth headsets. luckily, windows supports the latest bluetooth 5.4 technology, making it easier than ever to enable bluetooth in windows.
- Critical error on Skype allows hackers to execute malicious code remotelya serious flaw was discovered on microsoft's chat and call application, allowing hackers to remotely execute malicious code and cause system crashes.
- Learn about Bluetooth technologytoday, many devices are tightly coupled with bluetooth technology to enable wireless communication with other bluetooth devices. before using bluetooth, we should find out what this technology is and the security risks that may occur with it, as well as measures to avoid or protect you from these risks.
- Warning: Hackers can access smart speakersnow, as the trend of smart home grows, this also becomes the ideal target for hackers to exploit vulnerabilities in smart devices from refrigerators and televisions to smart speakers to perform behavior. unrighteous.
- Discovering more vulnerabilities makes Bluetooth devices vulnerable to malicious attacksbut besides the convenience, this connectivity technology has unintentionally increased data security and privacy issues on an individual level.
- How to turn on Bluetooth on Mactoday, most people have at least one bluetooth device. this handy short range communication standard allows connecting all kinds of devices with this capability together. this article will show you how to turn on bluetooth on mac.
- Top 30 serious security holes are being exploited by hackers the mostrecently, the cybersecurity agencies of australia, the uk and the us have issued a joint report detailing the most exploited vulnerabilities in 2020 and 2021.
- Hackers took control of 18,000 Huawei router devices in just one dayresearcher from newsky security recently discovered a hacker nicknamed anarchy, only 24 hours to build a botnet from 18,000 huawei router devices.