Bluetooth vulnerability BleedingTooth allows remote code execution in user devices.
A new Bluetooth vulnerability allows hackers to launch RCE attacks on user devices.
Bluetooth is one of the widely used communication channel around the world. The ease of use and the popularity that Bluetooth has makes it one of the most favorite target of hackers. BleedingTooth is the new vulnerability which was recently detected by security researchers.
A caveat is that only Linux devices can be targeted this way. The vulnerability is still is pretty lethal as privilege escalation is a possibility when the flaw is exploited. The vulnerability is found in a piece of software named BlueZ which is responsible for all Bluetooth based connections and other implementations in Linux systems.
The hackers can use this vulnerability to steal data from the users if there is a lack of proper access control in BlueZ. BleedingTooth can also lead to a major DDoS attack that can be easily executed.
Intel has also reported about these vulnerabilities in their report. The vulnerability has been termed as CVE-2020-12351 and has a severity score of 8.3 out of 10. The security patches for this vulnerabilities has been issued and must be downloaded by the users to protect their systems.
NPAV recommends users to keep their systems and software updated. These updates have all the required patches which will cover all the existing vulnerabilities. Users must stop using Bluetooth until these patches have been installed on their system.
Install NPAV on your devices to keep them protected from all kinds of cyber attacks. Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)