A vulnerability exists in specific executions of Bluetooth 4.0 through 5.0 which permits an assailant to reduce the strength or overwrite of the pairing secret, providing access to validated services. […]

Read more: bleepingcomputer.com