A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic.
References
Link | Resource |
---|---|
https://support.apple.com/en-us/HT214050 | Release Notes Third Party Advisory |
https://support.apple.com/en-us/HT214050 | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.apple.com/en-us/HT214050 - Release Notes, Third Party Advisory |
19 Jan 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 2.4 |
References | () https://support.apple.com/en-us/HT214050 - Release Notes, Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
First Time |
Apple
Apple magic Keyboard Apple magic Keyboard Firmware |
|
CPE | cpe:2.3:o:apple:magic_keyboard_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:apple:magic_keyboard:-:*:*:*:*:*:*:* |
12 Jan 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-12 23:15
Updated : 2024-11-21 08:46
NVD link : CVE-2024-0230
Mitre link : CVE-2024-0230
CVE.ORG link : CVE-2024-0230
JSON object : View
Products Affected
apple
- magic_keyboard_firmware
- magic_keyboard
CWE