Citrix: Blueborne: Protect Endpoints from Bluetooth Vulnerabilities with XenMobile
On Sept. 12, Armis labs disclosed that they have identified 8 new vulnerabilities in Bluetooth potentially exposing any Bluetooth-enabled device including Android, Windows, Linux, iOS, and various IoT devices to attack. These attacks could range from remotely switching on cameras for pictures and videos, turning on microphones, to stealing credentials by MITM (Man-In-The-Middle) attacks, etc.
More than 8 billion Bluetooth-enabled devices are at risk. This pretty much includes every “smart” device: from your smartphone, smart watch, smart TV to connected home. The scary part is that an attack does not require any user interaction; if your Bluetooth is switched on, you are a potential victim of eavesdropping and identity theft.
This Bluetooth vulnerability can potentially allow hackers to do one or more of the following depending on the platform, OS version, etc.:
- Take full control of the device remotely
- Route all traffic through a malicious proxy by reconfiguring IP routing
- Leak Bluetooth encryption keys
- Memory corruption
- Remote code execution
Read the entire article here, Blueborne: Protect Endpoints from Bluetooth Vulnerabilities with XenMobile
Via the fine folks at Citrix Systems, Inc.