Vulnerability identifier: #VU106920
Vulnerability risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-27964
CWE-ID:
CWE-287
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
AirPods firmware
Hardware solutions /
Firmware
Beats firmware
Hardware solutions /
Firmware
Vendor: Apple Inc.
Description
The vulnerability allows an attacker to gain unauthorized access to device.
The vulnerability exists due to incorrect authentication mechanism when headphones are seeking a connection request to one of previously paired devices. An attacker in Bluetooth range can spoof the intended source device and gain access to headphones.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
AirPods firmware: 4E71, 5B58 - 5B59, 5A374 - 5A377
Beats firmware: before 5B66
External links
https://support.apple.com/en-us/HT213752
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.