cve/2024/CVE-2024-0230.md

23 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0230)
![](https://img.shields.io/static/v1?label=Product&message=Magic%20Keyboard%20Firmware%20Update&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%3C%202.0.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=An%20attacker%20with%20physical%20access%20to%20the%20accessory%20may%20be%20able%20to%20extract%20its%20Bluetooth%20pairing%20key%20and%20monitor%20Bluetooth%20traffic&color=brighgreen)
### Description
A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic.
### POC
#### Reference
No PoCs from references.
#### Github
2024-06-10 07:22:43 +00:00
- https://github.com/H4lo/awesome-IoT-security-article
2024-05-26 16:36:09 +00:00
- https://github.com/gato001k1/helt
- https://github.com/keldnorman/cve-2024-0230-blue
2024-05-25 21:48:12 +02:00
- https://github.com/marcnewlin/hi_my_name_is_keyboard
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/shirin-ehtiram/hi_my_name_is_keyboard