Low
CVE-2024-21306
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Low
(1 user assessed)High
(1 user assessed)CVE-2024-21306
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Microsoft Bluetooth Driver Spoofing Vulnerability
Add Assessment
Ratings
-
Attacker ValueLow
-
ExploitabilityHigh
Technical Analysis
CVE-2024-21306 is part of a series of vulnerabilities affecting the Bluetooth stacks in multiple operating systems, allowing attackers to pair a virtual Bluetooth keyboard without authentication or user confirmation.
This vulnerability impacts Windows systems when a Bluetooth keyboard has been paired with the computer and is either powered off or out of range. In this case, the Windows system can be exploited if the user interacts with a malicious pairing request in any way (clicking accept, reject, or close). This vulnerability has been fixed in the January 2024 Patch Tuesday updates for Windows 10, 11, and Server 2022.
This is part of a broader issue with Bluetooth vulnerabilities across various platforms, including Android, Linux, macOS, and iOS, each having its own conditions and methods of exploitation. The vulnerabilities generally allow for keystroke injection, posing significant security risks.
Would you also like to delete your Exploited in the Wild Report?
Delete Assessment Only Delete Assessment and Exploited in the Wild ReportCVSS V3 Severity and Metrics
General Information
Vendors
- microsoft
Products
- windows 10 21h2,
- windows 10 22h2,
- windows 11 21h2,
- windows 11 22h2,
- windows 11 23h2,
- windows server 2022,
- windows server 2022 23h2
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: