Files
CVEs-PoC/2017/CVE-2017-8628.md
T
2025-09-29 21:09:30 +02:00

27 lines
1.3 KiB
Markdown

### [CVE-2017-8628](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8628)
![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Bluetooth%20Driver&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Windows%207%20SP1%2C%20Windows%208.1%2C%20Windows%20RT%208.1%2C%20Windows%2010%20Gold%2C%201511%2C%201607%2C%201703.%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Spoofing&color=brightgreen)
### Description
Microsoft Bluetooth Driver in Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703 allows a spoofing vulnerability due to Microsoft's implementation of the Bluetooth stack, aka "Microsoft Bluetooth Driver Spoofing Vulnerability".
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC
- https://github.com/JeffroMF/awesome-bluetooth-security321
- https://github.com/WinMin/Protocol-Vul
- https://github.com/XsafeAdmin/BlueBorne
- https://github.com/defaulthyun/defaulthyun
- https://github.com/engn33r/awesome-bluetooth-security
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/hw5773/blueborne
- https://github.com/maennis/blueborne-penetration-testing-tool
- https://github.com/pdubbbbbs/bluetooth-hardening-toolkit