Bluetooth driver update windows 10 2017

broken image
broken image

The attacker can then monitor and read the traffic before sending it on to the intended recipient. An attacker who successfully exploits this vulnerability could perform a man-in-the-middle attack and force a user's computer to unknowingly route traffic through the attacker's computer.

broken image

A spoofing vulnerability exists in the Microsoft implementation of the Bluetooth stack.

broken image