Left4Code (talk | contribs)
m link to nist
Left4Code (talk | contribs)
m second issue with sources
Line 52: Line 52:
Overall, this issue demonstrates a general lack of quality control, customer engagement, and transparency.  
Overall, this issue demonstrates a general lack of quality control, customer engagement, and transparency.  


=== Airpods Connection Vulnerability [CVE-2024-27867] (2025) ===
===Airpods Connection Vulnerability [CVE-2024-27867] (2025)===
...
A security vulnerability was discovered by Jonas Dreßler, this vulnerability would allow an attacker within the bluetooth range of any AirPods device to potentially spoof the source device address, redirecting it to another device controlled by the attacker and gaining control of the AirPods.<ref>{{Cite web |date=2024-06-24 |title=CVE-2024-27867 Detail |url=https://nvd.nist.gov/vuln/detail/CVE-2024-27867 |url-status=live |archive-url=https://web.archive.org/web/20251109172541/https://nvd.nist.gov/vuln/detail/CVE-2024-27867 |archive-date=2025-11-09 |access-date=2026-03-05 |website=National Institute of Standards and Technology {{!}} NIST}}</ref><ref>{{Cite web |date=2024-06-25 |title=About the security content of AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8 |url=https://support.apple.com/en-us/120907 |url-status=live |archive-url=https://web.archive.org/web/20260224082150/https://support.apple.com/en-us/120907 |archive-date=2026-02-22 |access-date=2026-03-05 |website=Apple Support |publisher=Apple Inc.}}</ref>


Incidents affecting all of the company's products can be found in the company article: [[Company article]]
Incidents affecting all of the company's products can be found in the company article: [[Company article]]