CAPEC-666

BlueSmacking
Średni
Średni
Draft
2021-06-24
00h00 +00:00
2022-09-29
00h00 +00:00
Alert dla konkretnego CAPEC
Bądź na bieżąco z wszelkimi zmianami dotyczącymi konkretnego CAPEC.
Zarządzaj powiadomieniami

Opisy CAPEC

An adversary uses Bluetooth flooding to transfer large packets to Bluetooth enabled devices over the L2CAP protocol with the goal of creating a DoS. This attack must be carried out within close proximity to a Bluetooth enabled device.

Informacje CAPEC

Przebieg wykonania

1) Explore

[Scan for Bluetooth Enabled Devices] Using BlueZ along with an antenna, an adversary searches for devices with Bluetooth on.

Technika
  • Note the MAC address of the device you want to attack.
2) Experiment

[Change L2CAP Packet Length] The adversary must change the L2CAP packet length to create packets that will overwhelm a Bluetooth enabled device.

Technika
  • An adversary downloads and installs BlueZ, the standard Bluetooth utility package for Linux.
3) Exploit

[Flood] An adversary sends the packets to the target device, and floods it until performance is degraded.

Wymagania wstępne

The system/application has Bluetooth enabled.

Wymagane umiejętności

An adversary only needs a Linux machine along with a Bluetooth adapter, which is extremely common.

Łagodzenie

Disable Bluetooth when not being used.
When using Bluetooth, set it to hidden or non-discoverable mode.

Powiązane słabości

CWE-ID Nazwa słabości

CWE-404

Improper Resource Shutdown or Release
The product does not release or incorrectly releases a resource before it is made available for re-use.

Odniesienia

REF-655

What is BlueSmack Attack?
Amrita Mitra.
https://www.thesecuritybuddy.com/bluetooth-security/what-is-bluesmack-attack/

Zgłoszenie

Nazwa Organizacja Data Data wydania
CAPEC Content Team The MITRE Corporation 2021-06-24 +00:00

Modyfikacje

Nazwa Organizacja Data Komentarz
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Taxonomy_Mappings