Apple this week announced Magic Keyboard firmware updates that patch a vulnerability potentially allowing attackers to inject keystrokes over Bluetooth.
The issue was disclosed in December by SkySafe software engineer Marc Newlin, who warned that an attacker within Bluetooth range could exploit the bug without authentication.
Newlin warned that an adversary would only need a Linux machine and a normal Bluetooth device to mount the attack, and that Android and Linux devices are also affected.
A vulnerable device, he explained, could be tricked into pairing with a fake keyboard without user confirmation, bypassing authentication.
On macOS and iOS, the engineer warned, the attack can be mounted even in Lockdown Mode, if Bluetooth is enabled and Magic Keyboard paired.
This week, Apple announced that the issue, tracked as CVE-2024-0230, has been addressed with the release of Magic Keyboard firmware version 2.0.6.
In its advisory the tech giant makes no mention of this vulnerability being exploitable to perform keystroke injection.
The new firmware release is now rolling out for Magic Keyboard, Magic Keyboard, and Magic Keyboard with numeric keypad, Touch ID, or Touch ID and numeric keypad. If the Magic Keyboard is paired to a macOS, iOS, iPadOS, or tvOS device, the firmware update will be delivered in the background, Apple explains.
Users can also go to System settings on their Macs to check for the update.
This Cyber News was published on www.securityweek.com. Publication date: Fri, 12 Jan 2024 11:43:05 +0000