Bluetooth MITRE EMB3D and ADF Mapping
EM3ED-only: Application-level software is present and running on the device (MITRE EM3ED PID-31)
-
Attack Vectors and Threats:
- Applications Binaries Modified (MITRE EM3ED TID-301)
Device includes OS/kernel (MITRE EM3ED PID-23)
Kernel or Operating System
- Keys: Kernel or Operating System | OS | Linux | Kernel
- Description: Device includes OS/kernel
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Information Leak (MITRE EM3ED TID-310)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Exploitable System Network Stack Component (MITRE EM3ED TID-202)
-
Operating System Susceptible to Rootkit (MITRE EM3ED TID-218)
-
EM3ED-only: Device includes an operating system that uses drivers/modules that can be loaded (MITRE EM3ED PID-231)
-
Attack Vectors and Threats:
- Malicious OS Kernel Driver/Module Installable (MITRE EM3ED TID-203)
Device includes a microprocessor (MITRE EM3ED PID-11)
Controller Implementation
- Keys: Controller Implementation | BC
- Description: Controller/CPU Implementation missbehaviour can disclose sensitive data
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
RID (MITRE EM3ED TID-327)
-
Information Leak (MITRE EM3ED TID-310)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Power Consumption Analysis Side Channel (MITRE EM3ED TID-101)
-
Electromagnetic Analysis Side Channel (MITRE EM3ED TID-102)
-
Microarchitectural Side Channels (MITRE EM3ED TID-103)
-
Hardware Fault Injection – Control Flow Modification (MITRE EM3ED TID-105)
-
Device exposes remote network services (MITRE EM3ED PID-41)
Session
- Keys: Session | Session
- Description: Session
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
DoS (MITRE EM3ED TID-404)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Critical System Service May Be Disabled (MITRE EM3ED TID-222)
-
Remotely Accessible Unauthenticated Services (MITRE EM3ED TID-310)
-
Undocumented Protocol Features (MITRE EM3ED TID-401)
-
Remotely Triggerable Deadlock/DoS (MITRE EM3ED TID-404)
-
Network Stack Resource Exhaustion (MITRE EM3ED TID-405)
-
Missing Message Replay Protection (MITRE EM3ED TID-407)
-
Device includes cryptographic functions for sensitive data, such as encryption or authentication (MITRE EM3ED PID-4113)
Entropy Negotiation
- Keys: Entropy Negotiation | Entropy neg | Entropy negotiation
- Description: Entropy negotiation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Security Manager Protocol
- Keys: Security Manager Protocol | SMP
- Description: Security Manager Protocol
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Bond Management
- Keys: Bond Management | BM
- Description: Bond Management
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Authentication Bypass By Message Replay (MITRE EM3ED TID-221)
-
Incorrect Certificate Verification Allows Authentication Bypass (MITRE EM3ED TID-316)
-
Predictable Cryptographic Key (MITRE EM3ED TID-317)
-
Insecure Cryptographic Implementation (MITRE EM3ED TID-318)
-
Cryptographic Protocol Side Channel (MITRE EM3ED TID-410)
-
Weak/Insecure Cryptographic Protocol (MITRE EM3ED TID-411)
-
Device lacks protocol support for message authentication (MITRE EM3ED PID-4111)
BLE
- Keys: BLE | BLE | BLE-Stack
- Description: BLE
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Eavesdropping
-
Unauthorized Messages or Connections (MITRE EM3ED TID-406)
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-
ADF-Only Surfaces (No MITRE EM3ED PID)
Pairing
- Keys: Pairing | Pairing
- Description: Pairing
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Authentication skip (MITRE EM3ED TID-411)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Authentication
- Keys: Authentication | Authentication
- Description: Authentication
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Feature Exchange
- Keys: Feature Exchange | Feature exchange
- Description: Feature exchange
-
Attack Vectors and Threats:
-
No IO downgrade (MITRE EM3ED TID-411)
-
RCE (MITRE EM3ED TID-310)
-
LMP
- Keys: LMP | LMP
- Description: LMP
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
CTKD
- Keys: CTKD | CTKD
- Description: Cross-Transport Key Derivation
-
Attack Vectors and Threats:
-
Entropy downgrade (MITRE EM3ED TID-411)
-
Legacy pairing
- Keys: Legacy pairing | Legacy pairing
- Description: Legacy pairing
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Key agreement
- Keys: Key agreement | Key agreement
- Description: Key agreement
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
Invalid ECC point (MITRE EM3ED TID-318)
-
Association
- Keys: Association | Association
- Description: Association
-
Attack Vectors and Threats:
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
No IO downgrade (MITRE EM3ED TID-411)
-
Provisioning
- Keys: Provisioning | Provisioning
- Description: Provisioning
-
Attack Vectors and Threats:
-
Key brute force (MITRE EM3ED TID-317)
-
Authentication challenge reflection (MITRE EM3ED TID-221)
-
BlueZ
- Keys: BlueZ | BlueZ
- Description: BlueZ
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
RID (MITRE EM3ED TID-327)
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
Android
- Keys: Android | Android
- Description: Android
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
Flouride
- Keys: Flouride | Flouride
- Description: Flouride
-
Attack Vectors and Threats:
-
RCE (MITRE EM3ED TID-310)
-
DoS (MITRE EM3ED TID-404)
-
Information Leak (MITRE EM3ED TID-310)
-
iOS
- Keys: iOS | iOS
- Description: iOS
-
Attack Vectors and Threats:
LEAP
- Keys: LEAP | LEAP
- Description: LEAP
-
Attack Vectors and Threats:
Scanning
- Keys: Scanning | Scanning
- Description: Scanning
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
MagicPairing
- Keys: MagicPairing | MagicPairing
- Description: MagicPairing
-
Attack Vectors and Threats:
HCI
- Keys: HCI | HCI
- Description: HCI
-
Attack Vectors and Threats:
-
Buffer overflowOut of Bounds (MITRE EM3ED TID-327)
-
A2MP
- Keys: A2MP | A2MP
- Description: A2MP
-
Attack Vectors and Threats:
-
Information Leak (MITRE EM3ED TID-310)
-
GATT
- Keys: GATT | GATT
- Description: GATT
-
Attack Vectors and Threats:
-
Eavesdropping
-