Attackers could abuse vulnerabilities discovered in the Bluetooth Core and Mesh Profile specifications to impersonate legitimate devices during the pairing process and launch man-in-the-middle (MitM) attacks. […]
This post appeared first on Bleeping Computer
Author: Sergiu Gatlan