<?xml version='1.0' encoding='UTF-8'?>
<urlset xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<url>
<loc>https://www.secmanagers.com/index.php/component/content/article/254-los-dispositivos-bluetooth-vuelven-a-ser-vulnerables-gracias-a-braktooth?catid=84&amp;Itemid=437</loc>
<video:video>
<video:thumbnail_loc>https://i.ytimg.com/vi/AekAMurR5Kk/hqdefault.jpg</video:thumbnail_loc>
<video:title>BrakTooth - Feature Response Flooding on Audio Products</video:title>
<video:description><![CDATA[BrakTooth captures a family of 16 vulnerabilities across Bluetooth Classic (BR/EDR) implementation of many system-on-a-chip (SoC) vendors.

This video demonstrates what happens when JBL TUNE 500BT is susceptible to Feature Response Flooding (CVE-2021-28135, CVE-2021-28155, CVE-2021-31717)

You can check more information about the vulnerabilities, available patches and affected devices and Proof of Concept (PoC) on ASSET Research Group BrakTooth disclosure website: 
https://asset-group.github.io/disclosures/braktooth/
https://braktooth.com

Always keep your devices updated to avoid potential attacks.]]></video:description>
<video:player_loc allow_embed="yes" autoplay="ap=1">https://www.youtube.com/embed/AekAMurR5Kk</video:player_loc>
<video:duration>67</video:duration>
<video:publication_date>2021-08-31T12:11:16+00:00</video:publication_date>
<video:live>no</video:live>
</video:video> 
</url>
</urlset>