Security News > 2021 > November > BrakTooth Bluetooth Bugs Bite: Exploit Code, PoC Released
The embargo period is over for a proof-of-concept tool to test for the recently revealed BrakTooth flaws in Bluetooth devices, and the researchers who discovered them have released both the test kit and full exploit code for the bugs.
BrakTooth is a collection of flaws affecting commercial Bluetooth stacks on more than 1,400 chipsets used in billions of devices - including smartphones, PCs, toys, internet-of-things devices and industrial equipment - that rely on Bluetooth Classic for communication.
BrakTooth tool now available for vendors to test and guard against Bluetooth vulnerabilities.
The PoC has been made available on the BrakTooth website on GitHub.
As the paper pointed out, all that attackers need to do to pick apart the BrakTooth bugs is an off-the-shelf ESP32 board that can be had for $14.80,, custom Link Manager Protocol firmware, and a computer to run the PoC tool.
Bluetooth Should Mind Its Ps & Qs. One expert noted that BrakTooth exemplifies attackers' "By any means necessary" mentality.
News URL
https://threatpost.com/braktooth-bluetooth-bugs-exploit-poc/176036/
Related news
- PoC exploit for critical WhatsUp Gold RCE vulnerability released (CVE-2024-8785) (source)
- Mitel MiCollab zero-day and PoC exploit unveiled (source)
- PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files (source)
- 390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits (source)