Bluetooth Vulnerability in Motorola Devices Allowing Unauthorized Access
CVE-2006-1365

Currently unrated

Key Information:

Vendor
Motorola
Vendor
CVE Published:
23 March 2006

Summary

The vulnerability enables attackers to remotely compromise Motorola devices by exploiting an OBEX Push Profile method. By initiating and then interrupting a transmission that mimics a vCard, attackers can add their Bluetooth devices to the target’s trusted device list. This potentially grants them unauthorized access, allowing manipulation of the device's functionalities and sensitive information.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.