Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar
CTO, Dr. Brett Walkenhorst Presents Bluetooth Threats: Implementation Flaws
Like any wireless protocol, there is the associated risk of implementation flaws. In this short video, CTO Dr. Brett Walkenhorst details some of the specific implementation flaws related to Bluetooth that have the potential to escalte to a full security breach. In the video he discusses attacks such as downgrade attacks on BLE4.2 secure connection only (SCO) mode, which is centered around exploited GATT authentication, and co-located app attacks, exploiting app connectivity to Bluetooth to gain access to secure data.
Bluetooth Threats – Implementation Flaws — Bastille
For more on Bluetooth:
- Bastille Webinar: Bluetooth Vulnerabilities Part 1
- Bastille Webinar: Bluetooth Vulnerabilities Part 2 (from this snippet)
- Bastille White Paper: Bluetooth Vulnerabilities