"The vulnerabilities work by tricking the Bluetooth host state-machine into pairing with a fake keyboard without user-confirmation. The underlying unauthenticated pairing mechanism is defined in the Bluetooth specification, and implementation-specific bugs expose it to the attacker."
#Bluetooth authentication bypass vulnerability #CVE-2023-45866 #Apple devices #Android devices #Linux devices
[
add
]
[
|
|
...
]