Dec. 21, 2023, 6 a.m. |

ZDI: Published Advisories www.zerodayinitiative.com

This vulnerability allows network-adjacent attackers to execute arbitrary code via Bluetooth on affected installations of BlueZ. User interaction is required to exploit this vulnerability in that the target must connect to a malicious device. The ZDI has assigned a CVSS rating of 7.1. The following CVEs are assigned: CVE-2023-44431.

arbitrary code attackers audio bluetooth bluez buffer buffer overflow code code execution connect cves cvss device exploit malicious network overflow profile rating remote code remote code execution stack target vulnerability zdi

More from www.zerodayinitiative.com / ZDI: Published Advisories

Security Specialist

@ Nestlé | St. Louis, MO, US, 63164

Cybersecurity Analyst

@ Dana Incorporated | Pune, MH, IN, 411057

Sr. Application Security Engineer

@ CyberCube | United States

Linux DevSecOps Administrator (Remote)

@ Accenture Federal Services | Arlington, VA

Cyber Security Intern or Co-op

@ Langan | Parsippany, NJ, US, 07054-2172

Security Advocate - Application Security

@ Datadog | New York, USA, Remote