back to article Zephyr OS Bluetooth vulnerabilities left smart devices open to attack

Vulnerabilities in the Zephyr real-time operating system's Bluetooth stack have been identified, leaving a wide variety of Internet of Things devices open to attack – unless upgraded to a patched version of the OS. A security advisory released by Synopsys this afternoon highlights eight key vulnerabilities in Zephyr's …

  1. Wilhemina Droodle

    Subtitle is the headliner

    Subtitle is one of the funniest in recent memory. Well done! LMO (no A left afterward).

  2. A random security guy Bronze badge

    It's been around for a long time, though.

    1. Michael Wojcik Silver badge

      Not sure what your antecedent is there.

      When the first draft Bluetooth spec came out, Bruce Schneier excoriated the committee in CRYPTO-GRAM for not including security professionals and doing a poor job with security in the first place. Bluetooth has never gotten better. While these are implementation vulnerabilities, the whole thing is a mess.

  3. Gene Cash Silver badge

    Bluetooth LE long-range mode??? WTF?

    "Bluetooth LE long-range mode, which was introduced in the Bluetooth 5 specification, may provide a range of up to 1km"

    Isn't that Bluetooth Low-Energy high-energy mode? My classic Bluetooth doesn't go past a couple dozen meters!

    1. Warm Braw Silver badge

      Re: Bluetooth LE long-range mode??? WTF?

      Isn't that Bluetooth Low-Energy high-energy mode?

      Actually, no. It's more of a lower-throughput, same energy mode.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2021