📦 Mesh Profile
by Bluetooth
🔍 What is Mesh Profile?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Bluetooth Mesh provisioning allows a nearby attacker to brute-force the AuthValue during device pairing before the provisioning timeout. Successful exploitation permits unauthori...
This vulnerability allows a nearby Bluetooth device to bypass authentication during Bluetooth Mesh provisioning, potentially gaining unauthorized access to the mesh network. It affects devices using B...