[Scan for Bluetooth Enabled Devices] Using BlueZ along with an antenna, an adversary searches for devices with Bluetooth on.
[Change L2CAP Packet Length] The adversary must change the L2CAP packet length to create packets that will overwhelm a Bluetooth enabled device.
[Flood] An adversary sends the packets to the target device, and floods it until performance is degraded.
Weakness Name | |
---|---|
Improper Resource Shutdown or Release The product does not release or incorrectly releases a resource before it is made available for re-use. |
Name | Organization | Date | Date Release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Taxonomy_Mappings |