Multiple vendors of Bluetooth devices are reported susceptible to an unauthorized access vulnerability. This vulnerability allows remote users to utilize the mobile device to act as a modem. Once connected, remote users may exploit the simulated modem to initiate calls, download potentially sensitive information from the mobile device, monitor conversations, divert calls, or connect to data services such as the Internet. Other attacks are also likely possible. It should be noted that this vulnerability is likely present in the application layer, and not in the actual Bluetooth protocol layer.
Multiple vendors of Bluetooth devices are reported susceptible to an unauthorized access vulnerability. This vulnerability allows remote users to utilize the mobile device to act as a modem. Once connected, remote users may exploit the simulated modem to initiate calls, download potentially sensitive information from the mobile device, monitor conversations, divert calls, or connect to data services such as the Internet. Other attacks are also likely possible. It should be noted that this vulnerability is likely present in the application layer, and not in the actual Bluetooth protocol layer.