Bluetooth Threats – Implementation Flaws

Excerpt From Bluetooth Vulnerabilities (Part 2) Webinar

CTO, Dr. Brett Walkenhorst Presents Bluetooth Threats: Implementation Flaws

Like any wireless protocol, there is the associated risk of implementation flaws. In this short video, CTO Dr. Brett Walkenhorst details some of the specific implementation flaws related to Bluetooth that have the potential to escalte to a full security breach. In the video he discusses attacks such as downgrade attacks on BLE4.2 secure connection only (SCO) mode, which is centered around exploited GATT authentication, and co-located app attacks, exploiting app connectivity to Bluetooth to gain access to secure data.

Bluetooth Threats – Implementation Flaws — Bastille

For more on Bluetooth:

For more information: