Hackers need to be physically close to a targeted network that has BLE enabled in order to mount an attack, but given this precondition the flaws create a mechanism for unauthenticated hackers to push malicious code onto vulnerable devices, according to Armis.ĭetails of the remote code execution-class vulnerabilities are being withheld pending a presentation due to take place at Black Hat Europe in London next month. ![]() ![]() The chips in question are used in networking kit from an array of vendors, including enterprise-grade WiFi access points from suppliers including Cisco, Meraki, and Aruba. We’ll update this story as and when more information comes to hand. The Daily Swig put these criticisms to Armis on Friday, but we’ve yet to receive a substantive response. It said the flaws had already been remediated. ![]() Texas Instruments, however, dismissed Armis’ warning as “factually unsubstantiated and potentially misleading”. The supposed security shortcoming of Bluetooth Low Energy (BLE) chips from Texas Instruments were publicized by security firm Armis ahead of an upcoming talk. UPDATED A brace of vulnerabilities in Bluetooth chips, collectively christened BleedingBit, allegedly create a means to hack into access points and other networking kit.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |