• 0 Posts
  • 2 Comments
Joined 2 years ago
cake
Cake day: June 3rd, 2023

help-circle
  • Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections.

    I really wish these articles just tell us what these scenarios are. I understand companies need publicity or need to sell software but if it isn’t replicatable and the article says “might be possible” it kind of sounds like a secuity sales pitch.

    This is especially the case if an attacker already has root access, planted malware, or pushed a malicious update on the device that opens up low-level access.

    This part basically sounds more like a software issue where the attacker has a way in already. The system is already vulernable at this point before using the exploit found.

    I don’t think there’s enough information out yet.

    It is very interesting though.