IT-Forscher erklären wie gefährlich eine Schwachstelle bei Bluetooth-Kopfhörern sein kann

Dennis Heinze und Frieder Steinmetz haben Bluetooth-Kopfhörer gehackt. Ein Gespräch über Schwachstellen, Schnittstellen und sensible Daten.

TAZ Verlags- und Vertriebs GmbH

🚨 A team of white-hat hackers just revealed a chilling remote hack on the 2020 Nissan LEAF! Using Bluetooth & DNS attacks, they gained full control-from steering to surveillance-without physical access. This exposes serious risks in EV security. Stay updated & cautious! 🔐🚗 #CyberSecurity #NissanLEAF #EVHack #BluetoothVulnerability #CarHacking #InfoSec #BlackHatAsia2025 #newz

Read more: https://cyberinsider.com/nissan-leaf-remotely-hacked-via-bluetooth-and-dns-attack/

Nissan LEAF Remotely Hacked via Bluetooth and DNS Attack

Researchers demonstrated a remote attack chain against the 2020 Nissan LEAF, converting the electric car into a remotely surveillance device.

CyberInsider
Unveiling the ESP32 Backdoor: Implications for IoT Security

Discover the ESP32 backdoor's impact on IoT security and the urgent need for robust protection measures.

The DefendOps Diaries
🚨CVE-2023-45866, a critical Bluetooth vulnerability, threatens Android, Linux, macOS, and iOS devices. Uncovered by Marc Newlin, this flaw lets attackers remotely execute code by injecting keystrokes. Stay informed and secure! Read more on our blog. #CyberSecurity #BluetoothVulnerability #TechSafety 🛡️💻📱
https://blog.torguard.net/new-bluetooth-vulnerability-exposes-major-operating-systems-to-cyber-attacks/

"🚨 Major Bluetooth Flaw in BlueZ: Keystroke Injection Risk! 🚨"

A Bluetooth vulnerability, CVE-2023-45866, has been uncovered, posing a significant threat to various devices. Discovered by Marc Newlin, this flaw in BlueZ allows unauthenticated devices to inject HID events, leading to potential keystroke injections and arbitrary command executions on affected devices. Particularly alarming, this vulnerability affects a wide range of operating systems including Android, Linux, macOS, and iOS, even those in Lockdown Mode.

Key details include:

  • BlueZ not properly restricting non-bonded devices from injecting HID events into the input subsystem.
  • Potential for an unauthenticated Peripheral role HID Device to establish an encrypted connection without user interaction, injecting HID messages.
  • CVE-2023-45866 carries a critical severity rating with a CVSS base score of 9.8, indicating a high level of threat.

Marc Newlin's analysis highlights that this attack exploits an unauthenticated pairing mechanism within the Bluetooth specification, allowing fake keyboards to connect to target devices.

Stay vigilant and update your devices! 🛡️📱💻

Tags: #CyberSecurity #BluetoothVulnerability #BlueZ #CVE202345866 #KeystrokeInjection #DeviceSecurity #MarcNewlin #ThreatAlert

Sources:

NVD - CVE-2023-45866