|Number of vulnerabilities||1|
|CVE ID|| CVE-2017-8628
|Exploitation vector||Local network|
|Public exploit||Not available|
|Vulnerable software versions||
Windows RT 8.1
Windows Server 2008
Windows Server 2016
A remote attacker can perform spoofing attack.
A spoofing vulnerability exists in Microsoft's implementation of the Bluetooth stack. An attacker can perform a MitM (Man-in-the-Middle) attack and force a user's computer to unknowingly route traffic through the attacker's computer. The attacker can then monitor and read the traffic before sending it on to the intended recipient.
Install updates from vendor's website.External links