Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2006-1367
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Motorola PEBL U6 08.83.76R, the Motorola V600, and possibly the Motorola E398 and other Motorola P2K-based phones does not require pairing for a connection related to the Headset Audio Gateway service, which allows user-assisted remote attackers to obtain AT level access and view phonebook entries and saved SMS messages by connecting on Bluetooth channel 3 and tricking the user into pressing Grant, aka a "Blueline" attack. NOTE: while user-assisted, the attack is made more feasible because of a GUI misrepresentation issue that allows a default message to be replaced by an attacker-specified one.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Motorola蓝牙接口访问验证漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Motorola PEBL U6和Motorola V600都是非常流行的蓝牙手机。 PEBL和V600手机对蓝牙接口的访问控制上存在问题,攻击者可能利用此漏洞非授权获取对手机的访问。 PEBL和V600手机都提供了两个语音网关,其中一个要求配对,而另一个不要求。3信道上的"Headset Audio Gateway"不要求配对,因此如果用户受骗按下了"允许"的话攻击者就可以获得对手机的额外访问。 在正常环境下3信道上的通讯会弹出以下消息: Remote Bluetooth Device Name Req
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2006-1367
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2006-1367
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2006-1367

No comments yet


Leave a comment