6.5
CVSSv3

CVE-2017-0785

Published: 14/09/2017 Updated: 28/07/2018
CVSS v2 Base Score: 3.3 | Impact Score: 2.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 312
Vector: AV:A/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

A information disclosure vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146698.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 6.0.1

google android 5.0

google android 4.0.1

google android 4.0.2

google android 4.3

google android 4.3.1

google android 7.1.2

google android 6.0

google android 5.1.1

google android 4.0

google android 4.2

google android 4.2.1

google android 4.2.2

google android 4.4.4

google android 7.1.0

google android 7.1.1

google android 5.1

google android 5.1.0

google android 4.1

google android 4.1.2

google android 4.4.2

google android 4.4.3

google android 8.0

google android 7.0

google android 5.0.1

google android 5.0.2

google android 4.0.3

google android 4.0.4

google android 4.4

google android 4.4.1

Vendor Advisories

Oracle Critical Patch Update Advisory - July 2018 Description A Critical Patch Update is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous C ...
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices Security patch levels of September 05, 2017 or later address all of these issues Refer to the Pixel and Nexus update schedule to learn how to check a device's security patch level Partners were notified of the issues described in the bulletin at ...
Oracle Critical Patch Update Advisory - January 2018 Description A Critical Patch Update is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previou ...

Github Repositories

CVE-2017-0785 PoC This is just a personal study based on the Android information leak vulnerability released by Armis Further reading: wwwarmiscom/blueborne/ To run, be sure to have pybluez and pwntools installed sudo apt-get install bluetooth libbluetooth-dev sudo pip install pybluez sudo pip install pwntools

Scan/Exploit Blueborne CVE-2017-0785

Blueborne CVE-2017-0785 This CVE and all the other BlueBorne CVEs are explained here: wwwarmiscom/blueborne/ This project was a proof of concept for a talk I gave in 2017 It simply performs a scan, prints out probably vulnerable hosts based on MACs and then runs the exploit on the target of your selection (if the device is actually vulnerable you will see a hex print

It is a vulnerability scanner for the blueborne exploit

Blueborne-Vulnerability-Scanner Instructions : sudo apt-get install bluetooth libbluetooth-dev sudo pip install pybluez sudo pip install pwntools git clone githubcom/navanchauhan/Blueborne-Vulnerability-Scanner/ cd Blueborne-Vulnerability-Scanner sudo bash scannersh If your result is [+] Exploit: Done 00000000 This Means your device is safe from this vulnerabili

bluescan ---- A powerful Bluetooth scanner This document is also available in Chinese(中文) This project is maintained by Sourcell Xu from DBAPP Security HatLab Under the terms stated in the GPL-30, anyone may redistribute copies of it to anyone Bluetooth is a complex protocol, and a good scanner can quickly help us peek inside its secrets But previous Bluetooth sc

Studying BlueBorne vulnerability at university-student level.

Project Bluepwn Bluepwn은 대학 연합 정보보안 커뮤니티 SUA (SecurityPlus Union Academy) 소속 대학생들로 구성된 팀, Nevermind에서 진행하고 있는 프로젝트입니다 본 프로젝트의 목적은 국내 보안 업계에 BlueBorne 취약점의 위험성을 더 자세히 알리면서 동시에 최대한 많은 사람들이 블루투스 보안에 대

Py3-CVE-2017-0785

Blueborne CVE-2017-0785 Android information leak vulnerability

CVE-2017-0785 PoC This is just a personal study based on the Android information leak vulnerability released by Armis Further reading: wwwarmiscom/blueborne/ To run, be sure to have pybluez and pwntools installed sudo apt-get install bluetooth libbluetooth-dev sudo pip install pybluez sudo pip install pwntools

CVE-2017-0785: BlueBorne PoC

CVE-2017-0785 PoC This is just a personal study based on the Android information leak vulnerability released by Armis Further reading: wwwfacebookcom/khelfatni To run, be sure to have pybluez and pwntools installed sudo apt-get install bluetooth libbluetooth-dev sudo pip install pybluez sudo pip install pwntools

Simply diff for CVE-2017-0785

diff Simply diff for CVE-2017-0785

A deployment of the BlueBorne attack vector to execute code on the Bluetooth Stack, opening a TCP/IP shell.

shellfish A deployment of the BlueBorne attack vector to execute code on the Bluetooth Stack, opening a TCP/IP shell NOTICE: I have no idea if/when this will work This is me attempting to generate a successful BlueBorne-based exploit My base code is in the following links: this is what I will be modifying to produce a full RCE exploit githubcom/ojasookert/CVE-2017-

CVE-2017-0785 Bluetooth module crash This script is a modified version of githubcom/ojasookert/CVE-2017-0785 It leaks information via SDP due to out-of-bound bytes, but sending too many packets or search requests causes the Bluetooth module on an Android smartphone above Android 40 to crash This vulnerability may be similiar to CVE-2017-0781 in what it achieves I b

Purpose only! The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks.

BlueBorne Join or Ask: Linnebergmai@gmailcom New Full: youtube/qTy5aC34GqI BlueBorne: googl/PSDuwY | Youtube: youtube/FJGGMyg0W38 Broadpwn: googl/xWC4hg | Youtube: youtube/GTb4Y2Y9shw Yalu Jailbreak iOS 1031 : googl/9cSSPU Help PR CVE-2017-0785 STEP 1 Now at this point, I am wondering if Armis left

Some PoC scripts for the Blueborne vulnerabilities on Android

blueborne Some PoC scripts for the Blueborne vulnerabilities on Android Contents crash_servicepy: Crashes the remote Bluetooth service using CVE-2017-0781 leak_memorypy: Leaks memory from the remote device using CVE-2017-0785 rce: Complex Remote Code Execution to open a reverse shell with the privileges of the Bluetooth service using both CVE-2017-0781 and CVE-2017-0785

sploit-bX Bash que instala los sploit CVE-2017-0781 y CVE-2017-0785 y lo necesario para su usos

常用蓝牙漏洞CVE poc、EXP

BlueBorne Android Exploit PoC This directory contains a PoC code of BlueBorne's Android RCE vulnerability (CVE-2017-0781) It also uses the SDP Information leak vulnerability (CVE-2017-0785) to bypass ASLR It achieves code execution on a Google Pixel Android smartphone running version 712 with Security Patch Level July or August 2017 This code can also be altered a bit

Android Blueborne RCE CVE-2017-0781

android712-blueborne Android Blueborne RCE CVE-2017-0781 In November 2017 a company called Armis published a proof of concept (PoC) of a remote code execution vulnerability in Android via Bluetooth (CVE-2017-0781), known as BlueBorne Although BlueBorne refers to a set of 8 vulnerabilities, this PoC in this article uses only 2 of them to achieve its goal BlueBorne only require

ASLR и способы его обхода Содержание Основы и предпосылки введения ASLR Примеры преодоления ASLR в Android SDP и уязвимости Bluetooth стеков Linux и Android (CVE-2017-1000250 и CVE-2017-0785) 1 Основы и предпосылки введения ASLR ASLR (Address Space Layout

blueborne PoC code

BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) c

BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) c

BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-10002…

Blue-Borne BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-20

BlueBorne Exploits & Framework ============================= This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities Under android exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found Under linux-bluez exploits for the Linux-RCE vulnerability (CVE-2017-1000

Blueborne Android Scanner Greetz shouts to sh3llg0d, an0n_l1t3, daemochi, akatz!!!! Overview Bluetooth scanner for blueborne-vulnerable devices, Android only for the moment Quickstart git clone githubcom/hook-s3c/blueborne-scannergit cd blueborne-scanner sudo chmod +x /bluebornescanpy pip install -r /requirementstxt /bluebornescanpy Breakdown Scans for local

Blueborne Android Scanner Greetz shouts to sh3llg0d, an0n_l1t3, daemochi, akatz!!!! Overview Bluetooth scanner for blueborne-vulnerable devices, Android only for the moment Quickstart git clone githubcom/hook-s3c/blueborne-scannergit cd blueborne-scanner sudo chmod +x /bluebornescanpy pip install -r /requirementstxt /bluebornescanpy Breakdown Scans for local

Bluetooth scanner for local devices that may be vulnerable to Blueborne exploit

Blueborne Android Scanner Greetz shouts to sh3llg0d, an0n_l1t3, daemochi, akatz!!!! Overview Bluetooth scanner for blueborne-vulnerable devices, Android only for the moment Quickstart git clone githubcom/hook-s3c/blueborne-scannergit cd blueborne-scanner sudo chmod +x /bluebornescanpy pip install -r /requirementstxt /bluebornescanpy Breakdown Scans for local

-CVE-2017-0785-BlueBorne-PoC CVE-2017-0785 BlueBorne PoC General Overview Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them The new vector is dubbed “BlueBorne”, as it spread through the air (airborne) and attacks devices via Bluetooth Armis h

CVE-2017-0785 BlueBorne PoC

-CVE-2017-0785-BlueBorne-PoC CVE-2017-0785 BlueBorne PoC General Overview Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them The new vector is dubbed “BlueBorne”, as it spread through the air (airborne) and attacks devices via Bluetooth Armis h

AD-Pentesting-Tools Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vul

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentesters-toolbox General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scan

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools Windows Active Directory Pentest General usefull Powershell Scripts githubcom/S3cur3Th1sSh1t/WinPwn - githubcom/dafthack/MailSniper githubcom/putterpanda/mimikittenz githubcom/dafthack/DomainPasswordSpray githubcom/mdavis332/DomainPasswordSpray - same but kerberos auth for more stealth and lockout-sleep github

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Useful Pentest tool links

Pentest-Tools Red-Team-Essentialss General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vu

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Pentest-Tools General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scanner C

Master-Cheat-Sheet General usefull Powershell Scripts AMSI Bypass restriction Bypass Payload Hosting Network Share Scanner Lateral Movement Reverse Shellz POST Exploitation Pivot Backdoor finder Persistence on windows Web Application Pentest Framework Discovery Framework Scanner / Exploitation Web Vulnerability Scanner / Burp Plugins Network- / Service-level Vulnerability Scan

List of Bluetooth BR/EDR/LE security resources

Awesome Bluetooth Security (BR, EDR, LE, and Mesh) This list links to useful references for anyone working with Bluetooth BR/EDR/LE or Mesh security Submit a PR if something is missing! To Do Add list of useful research papers and whitepapers Add list of useful articles Add list of useful books Contents Notable Vulnerabilities Conference Talks Bluetooth Security Tools Pri

Android Security Resources.

所有收集类项目 Android Android安全资源收集,初版。600+工具,1500+文章 English Version 目录 资源收集 (11) Github Repo 知名分析工具 ClassyShark -> (3)工具 (7)文章 jeb -> (14)工具 (50)文章 enjarify -> (2)工具 (1)文章 androguard -> (5)工具 (14)文章 jadx -> (3)工具 (3)文章 jd-gui -&a

hacking tools awesome lists

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents ASP Arduino Assembly AutoHotkey AutoIt Batchfile Boo C C# C++ CMake CSS CoffeeScript Dart Dockerfile Emacs Lisp Erlang Game Maker Language Go HTML Haskell Java JavaScript Jupyter Notebook KiCad Kotlin Logos Lua M Makefile Markdown Mask Max Nginx OCaml Objective-C Objective-C++ Others PHP PLSQL P

Awesome Bluetooth Security (BR, EDR, LE, and Mesh) This list links to useful references for anyone working with Bluetooth BR/EDR/LE or Mesh security Submit a PR if something is missing! To Do Add list of useful research papers and whitepapers Add list of useful articles Add list of useful books Contents Notable Vulnerabilities Conference Talks Bluetooth Security Tools Pri

TOP all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things Table of Contents 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2022 star name url des 961 CVE-2022-0847-

TOP all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things Table of Contents 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2022 star name url des 975 CVE-2022-0847-

TOP all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things Table of Contents 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2022 star name url des 988 CVE-2022-0847-

Table of Contents 2023 year top total 30 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2023 star updated_at name url des 304 2023-03-18T21:10:14Z Windows_LPE_AFD_CVE-2023-21768 githubcom/chompie1337/Wi

Table of Contents 2023 year top total 30 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2012 year top total 30 2011 year top total 30 2010 year top total 30 2009 year top total 30 2008 year top to

Here is a collection about Proof of Concepts of Common Vulnerabilities and Exposures, and you may also want to check out current Contents CVE-2011-2856 CVE-2011-3243 CVE-2013-2618 CVE-2013-6632 CVE-2014-1701 CVE-2014-1705 CVE-2014-1747 CVE-2014-3176 CVE-2014-6332 CVE-2014-7927 CVE-2014-7928 CVE-2015-0072 CVE-2015-0235 CVE-2015-0240 CVE-2015-1233 CVE-2015-1242 CVE-2015-1268 CV

Awesome CVE PoC A curated list of CVE PoCs Here is a collection about Proof of Concepts of Common

Awesome CVE PoC A curated list of CVE PoCs Here is a collection about Proof of Concepts of Common Vulnerabilities and Exposures, and you may also want to check out awesome-web-security Please read the contribution guidelines before contributing This repo is full of PoCs for CVEs If you enjoy this awesome list and would like to support it, check out my Patreon page :

PoC auto collect from GitHub.

PoC in GitHub 2020 CVE-2020-0022 In reassemble_and_dispatch of packet_fragmentercc, there is possible out of bounds write due to an incorrect bounds calculation This could lead to remote code execution over Bluetooth with no additional execution privileges needed User interaction is not needed for exploitationProduct: AndroidVersions: Android-80 Android-81 Android-9 Andr

Recent Articles

BlueBorne Vulnerability Also Affects 20Mil Amazon Echo and Google Home Devices
BleepingComputer • Catalin Cimpanu • 15 Nov 2017

Over 20 million Amazon Echo and Google Home devices running on Android and Linux are vulnerable to attacks via the BlueBorne vulnerability, IoT cyber-security firm
announced today.
Both Amazon and Google have issued patches for the affected products, hence today's disclosure from Armis.
is a set of eight vulnerabilities in the Bluetooth implementations deployed on Android, iOS, Microsoft, and Linux. Affected OS makers and several IoT device makers issued updates in mid-Septe...

Wireless ‘BlueBorne’ Attacks Target Billions of Bluetooth Devices
Threatpost • Tom Spring • 12 Sep 2017

Researchers disclosed a bevy of Bluetooth vulnerabilities Tuesday that threaten billions of devices from Android and Apple smartphones to millions of printers, smart TVs and IoT devices that use the short-range wireless protocol.
Worse, according to researchers at IoT security firm Armis that found the attack vector, the so-called “BlueBorne” attacks can jump from one nearby Bluetooth device to another wirelessly. It estimates that there are 5.3 billion devices at risk.
“If exp...

BlueBorne Vulnerabilities Impact Over 5 Billion Bluetooth-Enabled Devices
BleepingComputer • Catalin Cimpanu • 12 Sep 2017

Security researchers have discovered eight vulnerabilities — codenamed collectively as BlueBorne — in the Bluetooth implementations used by over 5.3 billion devices.
Researchers say the vulnerabilities are undetectable and unstoppable by traditional security solutions. No user interaction is needed for an attacker to use the BleuBorne flaws, nor does the attacker need to pair with a target device.
They affect the Bluetooth implementations in Android, iOS, Microsoft, and Linux, im...