Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: New Bluetooth Exploits Pose Risk to Multiple Operating Systems
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

New Bluetooth Exploits Pose Risk to Multiple Operating Systems

Highlights

  • New Bluetooth vulnerabilities threaten device security.

  • Cybersecurity expert uncovers serious control exploit.

  • Attack possible without user permission on affected devices.

NEWSLINKER
Last updated: 21 January, 2024 - 7:07 am 7:07 am
NEWSLINKER 2 years ago
Share
SHARE

Recent discoveries in Bluetooth security have revealed critical vulnerabilities across various operating systems, including Android, Linux, macOS, iOS, and Windows. These weaknesses are particularly alarming as they provide an avenue for unauthorized access to devices, potentially resulting in data theft, surveillance, and the execution of harmful code.

Contents
Discovery of a New ThreatPotential Consequences of Exploitation

Discovery of a New Threat

Cybersecurity expert Marc Newlin has identified a new Bluetooth flaw that could be exploited to take control of devices running the aforementioned operating systems. This vulnerability is especially concerning because it allows attackers to bypass the need for user permission to pair devices.

Potential Consequences of Exploitation

Upon exploiting this vulnerability, attackers can emulate a Bluetooth keyboard connection, which then enables them to inject keystrokes without detection. This method of attack can have far-reaching implications for device security and user privacy.

The technical aspects of the vulnerability involve the use of HID (Human Interface Device) reports for communication, which are not limited to a specific transport medium. Bluetooth HID connections utilize L2CAP sockets and require connections to specific ports for successful communication. A secure connection typically involves pairing, bonding, and encryption to safeguard data.

The vulnerability impacts a range of Linux distributions and can be exploited under certain conditions. These include the device being discoverable, supporting unauthenticated keyboard pairing, and allowing access to the relevant L2CAP ports. While Linux and Android devices are generally vulnerable when discoverable, macOS, iOS, and Windows systems limit exposure to known peripherals, which somewhat mitigates the risk.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

NIST Faces Staff Cuts While Accelerating Encryption Validation Efforts

European GCVE Network Launches to Decentralize Vulnerability Tracking

Police Pursue Black Basta Ransomware Figures as Network Faces Setbacks

Cybersecurity Experts Tackle Dilemmas in Ransomware Negotiations

HackerOne Urges Industry to Back Good Faith AI Security Research

Share This Article
Facebook Twitter Copy Link Print
By NEWSLINKER
NEWS LINKER is your premier source for the latest in business, finance, science, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Dive deep into the world of cutting-edge developments, breakthroughs, market trends, and game-changing innovations..
Previous Article Tesla Rolls Out Limited Demo Drives for Redesigned Model 3 “Highland” in North America
Next Article Colorcon to Showcase Expanded Healthcare Portfolio at Pharmapack

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Zipline Expands Drone Delivery as Funding Boosts National Growth
Robotics
Starbreeze Faces Fresh Layoffs as Payday 3 Struggles Continue
Gaming
Jordan Authorities Use Cellebrite Tech to Access Activists’ Phones
Apple
Tesla Sets Ambitious Low Cost Target for Cybercab’s Operation
Electric Vehicle
Elon Musk Joins Davos 2026, Sits Down with BlackRock’s Fink
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?