Updates to the Bluetooth Core Specification cover a wide spectrum, from enhancements to existing features to the introduction of major new features that represent significant advancements to the technology and open new possibilities for wireless innovation. Like all Bluetooth specifications, the core specification is regularly updated and enhanced by the Bluetooth SIG Core Working Group to satisfy evolving technology and market needs. The Bluetooth Core Specification is one of the key building blocks that has defined the technology and enabled the development of a thriving ecosystem of interoperable Bluetooth enabled devices. The hard work and collaboration between Bluetooth Special Interest Group (SIG) member companies has driven the continuous innovation of the technology and has allowed Bluetooth technology to meet the growing demand for wireless communication across countless use cases for more than 20 years. Bluetooth users are recommended to install the latest recommended updates from device and operating system manufacturers as and when they are available.One of the key reasons why Bluetooth ® technology has emerged as the global wireless standard powering the IoT is its rate of evolution. The Bluetooth Special Interest Group (SIG), the organization that oversees the development of Bluetooth standards, has also issued security notices for each of the six flaws. "As a result, we consider this security vulnerability remediated." We have a production release of our NetCloud OS code available (NCOS version 7.21.40) that fixes the cited issues," the company told The Hacker News over email. "Cradlepoint was notified of the BLE vulnerabilities prior to public disclosure. AOSP, Cisco, and Microchip Technology said they are currently working to mitigate the issues. The Android Open Source Project (AOSP), Cisco, Cradlepoint, Intel, Microchip Technology, and Red Hat are among the identified vendors with products impacted by these security flaws. Our attacks target the standardized Bluetooth authentication procedure, and are therefore effective against any standard compliant Bluetooth device," the researchers said. "Our attacks work even when the victims are using Bluetooth's strongest security modes, e.g., SSP and Secure Connections.
0 Comments
Leave a Reply. |