BLURtooth – A new Vulnerability Let Attackers to Overwrite the Authentication Keys

0 minutes

BLURtooth

Security researchers from at the École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University discovered vulnerabilities related to Cross-Transport Key Derivation (CTKD) with Bluetooth BR/EDR and LE in Bluetooth Specifications 4.0 through 5.0. Bluetooth BR/EDR and LE that using Cross-Transport Key Derivation (CTKD) are vulnerable to key overwrite which allows attackers to gain additional access […]

Advertisements

The post BLURtooth – A new Vulnerability Let Attackers to Overwrite the Authentication Keys appeared first on GBHackers On Security.



Source: GB Hackers – BLURtooth – A new Vulnerability Let Attackers to Overwrite the Authentication Keys

Advertisements
Keep Ransomware Out with Heimdal PRO!