Permission control vulnerability in the Bluetooth module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.
Analyzing vulnerability vectors…
Your command center for real-time vulnerability intelligence — built for security professionals who need answers fast.
Get the full picture on any CVE — kill chain diagrams, exploit sequences, technical breakdowns, and key risks. No credit card required.