A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146698.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
google android 6.0.1 |
||
google android 5.0 |
||
google android 4.0.1 |
||
google android 4.0.2 |
||
google android 4.3 |
||
google android 4.3.1 |
||
google android 7.1.2 |
||
google android 6.0 |
||
google android 5.1.1 |
||
google android 4.0 |
||
google android 4.2 |
||
google android 4.2.1 |
||
google android 4.2.2 |
||
google android 4.4.4 |
||
google android 7.1.0 |
||
google android 7.1.1 |
||
google android 5.1 |
||
google android 5.1.0 |
||
google android 4.1 |
||
google android 4.1.2 |
||
google android 4.4.2 |
||
google android 4.4.3 |
||
google android 8.0 |
||
google android 7.0 |
||
google android 5.0.1 |
||
google android 5.0.2 |
||
google android 4.0.3 |
||
google android 4.0.4 |
||
google android 4.4 |
||
google android 4.4.1 |
Over 20 million Amazon Echo and Google Home devices running on Android and Linux are vulnerable to attacks via the BlueBorne vulnerability, IoT cyber-security firm
announced today.
Both Amazon and Google have issued patches for the affected products, hence today's disclosure from Armis.
is a set of eight vulnerabilities in the Bluetooth implementations deployed on Android, iOS, Microsoft, and Linux. Affected OS makers and several IoT device makers issued updates in mid-Septe...
Researchers disclosed a bevy of Bluetooth vulnerabilities Tuesday that threaten billions of devices from Android and Apple smartphones to millions of printers, smart TVs and IoT devices that use the short-range wireless protocol.
Worse, according to researchers at IoT security firm Armis that found the attack vector, the so-called “BlueBorne” attacks can jump from one nearby Bluetooth device to another wirelessly. It estimates that there are 5.3 billion devices at risk.
“If exp...
Security researchers have discovered eight vulnerabilities — codenamed collectively as BlueBorne — in the Bluetooth implementations used by over 5.3 billion devices.
Researchers say the vulnerabilities are undetectable and unstoppable by traditional security solutions. No user interaction is needed for an attacker to use the BleuBorne flaws, nor does the attacker need to pair with a target device.
They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, im...