Bluetooth is a technology that is very present in the daily lives of users. There are many devices that depend on it to function. Over time it has improved in terms of stability and speed, but there are still occasionally security flaws. Today we echo BleedingTooth , a vulnerability that affects this technology.
BleedingTooth, the vulnerability that affects Bluetooth
As we say, Bluetooth is present in a large number of devices and systems. It can happen that sometimes a problem arises that only affects a certain operating system, for example. This is the case with BleedingTooth, which puts Linux computers in check.

Now from Google they have detected an important failure that affects this communication protocol. This problem, which they have named BleedingTooth, makes a device vulnerable to remote code execution without interaction.
In the event that a possible attacker exploited this vulnerability, they could obtain a privilege escalation . It could ultimately take control of that computer and compromise the privacy and security of users.
This flaw is more specifically in a software called BlueZ . He is responsible for all connections that are based on Bluetooth and other implementations on Linux systems.
In addition to this, information could also be stolen due to the lack of proper access controls at BlueZ, and denial of service attacks can be executed, as indicated in a security advisory from Intel.
Intel has rated this vulnerability, registered as CVE-2020-12351 , very severe with a score of 8.3.

How to avoid being a victim of this problem
This type of fault is not something extraordinary and that it is rare to find. There are many vulnerabilities that can compromise the security of our computers. Luckily our best ally are patches and updates.
It is essential that our equipment is updated with the latest versions . In this way we can correct these problems that put our security at risk. Linux users should make sure they have the latest version on their system, with all patches installed. Of course, you have to manually make sure that our version has received these patches.
In case we do not yet have the patches available or for some reason we cannot update, an alternative step we can take is to disable Bluetooth in our system. In this way we will prevent possible intruders from exploiting this problem.
In short, BleedingTooth is a security flaw that puts the use of Bluetooth at risk. It affects Linux users and it is important that we have the latest versions to prevent it from being exploited by possible attackers.
It is very important that we always protect our networks and equipment. In the case of wireless communication protocols, as in this case, even more so. That is why we leave you an article where we explain why turn off Bluetooth if it is not used. One more security measure to prevent.