

Rewterz Threat Alert – Agent Tesla Malware – Active IOCs
December 12, 2023
Rewterz Threat Alert – Lumma Stealer Malware aka LummaC – Active IOCs
December 12, 2023
Rewterz Threat Alert – Agent Tesla Malware – Active IOCs
December 12, 2023
Rewterz Threat Alert – Lumma Stealer Malware aka LummaC – Active IOCs
December 12, 2023Severity
High
Analysis Summary
A newly discovered critical Bluetooth vulnerability could allow threat actors who exploit it to take over Android, macOS, Linux, and iOS devices. The security flaw, tracked as CVE-2023-45866, is an authentication bypass that lets malicious users connect to devices and enter keystrokes to execute code as the victim.
Various Bluetooth stacks have vulnerabilities that enable authentication bypass and allow a threat actor to connect to any discoverable device without the need for user confirmation and inject keystrokes. The attack is capable of deceiving the target device into thinking that it is connected to a Bluetooth keyboard by leveraging a Bluetooth specification of an “unauthenticated pairing mechanism”.
When the vulnerability is successfully exploited, it could allow an attacker within proximity to connect to a vulnerable device and enter keystrokes to download malicious apps and run arbitrary commands without even requiring any specialized hardware. It can be carried out from a computer with Linux using a normal Bluetooth adaptor, and it affects multiple versions of Android, iOS, Linux, and macOS.
The flaw works in Apple’s LockDown mode, which is meant as a security measure against sophisticated cyber threats. It also affects macOS and iOS when Bluetooth is turned on and a Magic Keyboard has been paired with a vulnerable device. In an advisory by Google, they noted that the vulnerability could lead to privilege escalation remotely with no additional execution privileges required.
Impact
- Privilege Escalation
- Code Execution
- Unauthenticated Access
Remediation
- Upgrade to the latest version of Android, available from the Android Open Source Project.
- Keep all software, including operating systems, browsers, and applications, up to date with the latest security patches.
- Monitor network traffic for unusual or suspicious activity.
- Regularly back up critical data and systems.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Conduct regular security audits and penetration testing to identify and address vulnerabilities proactively.
- Regularly back up critical data and ensure that a robust backup and recovery plan is in place.