Home > Cyber Security News > #maninthemiddle

Bluetooth flaws allow attackers to impersonate legitimate devices

Attackers could abuse vulnerabilities discovered in the Bluetooth Core and Mesh Profile specifications to impersonate legitimate devices during the pairing process and launch man-in-the-middle (MitM) attacks.

Facebook logo Twitter logo LinkedIn logo Instagram logo