Bluetooth Vulnerability in Motorola Devices Allowing Unauthorized Access
CVE-2006-1365
Currently unrated
Summary
The vulnerability enables attackers to remotely compromise Motorola devices by exploiting an OBEX Push Profile method. By initiating and then interrupting a transmission that mimics a vCard, attackers can add their Bluetooth devices to the target’s trusted device list. This potentially grants them unauthorized access, allowing manipulation of the device's functionalities and sensitive information.
References
Timeline
Vulnerability published
Vulnerability Reserved