Recently our competitor Armis discovered two critical vulnerabilities related to the use of Bluetooth Low Energy (BLE) chips made by Texas Instruments (TI) and used in Cisco, Meraki, and Aruba wireless access points, called “BLEEDINGBIT.”

If exploited, they allow an unauthenticated attacker to break into enterprise networks undetected, take over access points, spread malware, and move laterally across network segments.

While traditional network and endpoint security solutions fail to detect these vulnerabilities, WootCloud can provide ten capabilities to address this vulnerability and these types of attacks.

Addressing the BLEEDINGBIT vulnerabilities with our solution is an example of how WootCloud can neutralize new attack vectors targeting unmanaged and unprotected devices. Since 2017, WootCloud has been stopping BlueBorne, a set of nine zero-day Bluetooth-related vulnerabilities in customer production environments.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>