Glossary

Common BLE Vulnerabilities:

No pairing required (open access to characteristics) - Just Works pairing (no PIN/passkey — vulnerable to MITM) - Unencrypted communication (data readable by nearby attackers) - Static MAC addresses (device tracking) - Writable characteristics without authentication (command injection) - Sensitive d

Learn More

Related Terms