New Bluetooth Vulnerability Affected Millions of Devices that Allows Remote Attackers to Steal the Encryption key

Bluetooth Vulnerability

Newly discovered Bluetooth vulnerability in implemented firmware and operating system software drivers allows remote attackers could obtain the encryption key used by the vulnerable devices. This vulnerability occurs due to Bluetooth devices are not sufficiently validated elliptic curve parameters when it used to generate public keys during a Diffie-Hellman key exchange Encryption communication between two Bluetooth devices […]

The post New Bluetooth Vulnerability Affected Millions of Devices that Allows Remote Attackers to Steal the Encryption key appeared first on GBHackers On Security.