An insecure permission vulnerability exists in the Agasta Easytouch+ version 9.3.97 The device allows unauthorized mobile applications to connect via Bluetooth Low Energy (BLE) without authentication. Once an unauthorized connection is established, legitimate applications are unable to connect, causing a denial of service. The attack requires proximity to the device, making it exploitable from an adjacent network location.
A product defines a set of insecure permissions that are inherited by objects that are created by the program.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Easy_touch_plus_firmware | Agasta | 9.3.97 (including) | 9.3.97 (including) |