Exploitation via Bluetooth

TID
ATE-016

Vulnerabilities in bluetooth stack may allow an attacker to execute code and gain access to the system.

Type
Technique
Severity of Impact
High
Severity of Feasibility
Low
Scalability
Moderatly
Domain
Automotive