
Bluetooth Vulnerabilities Expose Android, Linux, macOS, and iOS Devices to Hackers
A critical Bluetooth security flaw, tracked as CVE-2023-45866, allows hackers to take control of Android, Linux, macOS, and iOS devices by exploiting an authentication bypass vulnerability. The flaw enables attackers to connect to vulnerable devices and inject keystrokes, leading to code execution. The attack tricks the target device into thinking it's connected to a Bluetooth keyboard, exploiting an unauthenticated pairing mechanism. The vulnerability affects a wide range of devices running Android, iOS, Linux, and macOS, and can be performed using a regular Bluetooth adapter on a Linux computer. No specialized hardware is required.
