In November 2018, Armis disclosed BLEEDINGBIT, two critical chip-level vulnerabilities related to the use of Bluetooth Low Energy (BLE) chips made by Texas Instruments (TI) used in millions of enterprise access points made by Cisco, Meraki and Aruba, which together account for nearly 70% of the market. Using BLEEDINGBIT, an unauthenticated attacker can break into enterprise networks undetected, take control of an access point, and render network segmentation useless.
Read this report to learn the full scope of the effecs of BLEEDINGBIT including:
Details about both vulnerabilities
The exploitation process on access points
What you can do to keep your network safe