:::: MENU ::::

Howk IT-Dienstleistungen

Howk IT Services – Howk IT-Dienstleistungen

BleedingTooth Linux Exploit Can Lead to Remote Code Execution Within Bluetooth Range

  • Oct 16 / 2020
  • 0
Hi Tech

BleedingTooth Linux Exploit Can Lead to Remote Code Execution Within Bluetooth Range

BleedingTooth Linux Exploit Can Lead to Remote Code Execution Within Bluetooth Range
A new Bluetooth security vulnerability has appeared, and this time Linux is under the gun. Andy Nguyen, an information security researcher, discovered the vulnerabilities. They are collectively known as BleedingTooth, which allows for zero-click remote code execution on Linux devices within Bluetooth range. The code can be executed with kernel

Leave a comment