Dettaglio CAPEC-666

CAPEC-666

BlueSmacking
Medio
Medio
Draft
2021-06-24
00h00 +00:00
2022-09-29
00h00 +00:00
Avviso per un CAPEC specifico
Rimani informato su qualsiasi modifica relativa a un CAPEC specifico.
Gestione notifiche

Descrizioni CAPEC

An adversary uses Bluetooth flooding to transfer large packets to Bluetooth enabled devices over the L2CAP protocol with the goal of creating a DoS. This attack must be carried out within close proximity to a Bluetooth enabled device.

Informazioni CAPEC

Flusso di esecuzione

1) Explore

[Scan for Bluetooth Enabled Devices] Using BlueZ along with an antenna, an adversary searches for devices with Bluetooth on.

Tecnica
  • Note the MAC address of the device you want to attack.
2) Experiment

[Change L2CAP Packet Length] The adversary must change the L2CAP packet length to create packets that will overwhelm a Bluetooth enabled device.

Tecnica
  • An adversary downloads and installs BlueZ, the standard Bluetooth utility package for Linux.
3) Exploit

[Flood] An adversary sends the packets to the target device, and floods it until performance is degraded.

Prerequisiti

The system/application has Bluetooth enabled.

Competenze richieste

An adversary only needs a Linux machine along with a Bluetooth adapter, which is extremely common.

Mitigazioni

Disable Bluetooth when not being used.
When using Bluetooth, set it to hidden or non-discoverable mode.

Vulnerabilità correlate

CWE-ID Nome della vulnerabilità

CWE-404

Improper Resource Shutdown or Release
The product does not release or incorrectly releases a resource before it is made available for re-use.

Riferimenti

REF-655

What is BlueSmack Attack?
Amrita Mitra.
https://www.thesecuritybuddy.com/bluetooth-security/what-is-bluesmack-attack/

Invio

Nome Organizzazione Data Data di rilascio
CAPEC Content Team The MITRE Corporation 2021-06-24 +00:00

Modifiche

Nome Organizzazione Data Commento
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Taxonomy_Mappings