First published: Tue Jan 09 2024(Updated: )
A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic.
Credit: Marc Newlin SkySafe product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Magic Keyboard Firmware Update | <2.0.6 | 2.0.6 |
All of | ||
Apple Magic Keyboard Firmware | <2.0.6 | |
Apple Magic Keyboard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-0230 is classified as a moderate severity vulnerability due to its potential for physical access exploitation.
To fix CVE-2024-0230, update to the Magic Keyboard Firmware Update version 2.0.6.
The risks associated with CVE-2024-0230 include the potential for an attacker with physical access to extract Bluetooth pairing keys and monitor Bluetooth traffic.
CVE-2024-0230 affects users of the Apple Magic Keyboard Firmware prior to version 2.0.6.
Yes, physical access to the Magic Keyboard is required to exploit CVE-2024-0230.