CAPEC 667 Bluetooth Impersonation AttackS (BIAS)

Draft Detailed Medium Risk
Severity High

Description

An adversary disguises the MAC address of their Bluetooth enabled device to one for which there exists an active and trusted connection and authenticates successfully. The adversary can then perform malicious actions on the target Bluetooth device depending on the target\u00e2\u0080\u0099s capabilities.

Attack Execution Flow

3

Mitigations

3

Consequences

Relationships