Exploitation via Bluetooth

Vulnerabilities in bluetooth stack may allow an attacker to execute code and gain access to the system. 

Technique_ID
ATE-016
Severity of Impact
High
Severity of Feasibility
Low
Scalability
Moderatly
Domain
Automotive