Skip to main content

CVE-2024-0230: An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic in Apple Magic Keyboard Firmware Update

Low
VulnerabilityCVE-2024-0230cvecve-2024-0230
Published: Fri Jan 12 2024 (01/12/2024, 23:10:45 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Magic Keyboard Firmware Update

Description

A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic.

AI-Powered Analysis

AILast updated: 07/04/2025, 15:26:27 UTC

Technical Analysis

CVE-2024-0230 is a vulnerability identified in the Apple Magic Keyboard Firmware prior to version 2.0.6. The issue stems from a session management flaw that allowed an attacker with physical access to the Magic Keyboard accessory to potentially extract the Bluetooth pairing key. This key is critical for establishing a secure Bluetooth connection between the keyboard and the paired device. If an attacker obtains this key, they could monitor Bluetooth traffic between the keyboard and the host device, potentially capturing sensitive keystrokes or other data transmitted over the Bluetooth channel. The vulnerability does not allow for modification or disruption of the keyboard's operation (no integrity or availability impact), but it compromises confidentiality by exposing the pairing key and enabling passive eavesdropping. The flaw was addressed by Apple through improved session management checks in firmware update 2.0.6. The CVSS v3.1 score is 2.4, reflecting a low severity primarily because exploitation requires physical access to the device, no user interaction, and no privileges. There is no indication of known exploits in the wild at this time. The vulnerability affects unspecified versions of the Magic Keyboard firmware prior to the fix, and no detailed affected version range is provided. The attack vector is physical access, which limits the scope of exploitation to scenarios where an attacker can physically handle the keyboard, such as in office environments, public spaces, or during transit. The vulnerability does not require authentication or user interaction, but the prerequisite of physical access significantly reduces the attack surface. This flaw highlights the importance of securing peripheral devices that use wireless communication protocols like Bluetooth, as they can be an entry point for data interception if compromised.

Potential Impact

For European organizations, the impact of this vulnerability is primarily related to confidentiality risks in environments where Apple Magic Keyboards are used and physical access to peripherals can be obtained by unauthorized individuals. Sensitive information typed on compromised keyboards could be intercepted if an attacker extracts the Bluetooth pairing key and monitors traffic. This is particularly concerning in high-security environments such as government offices, financial institutions, and corporate headquarters where sensitive data entry occurs. However, the requirement for physical access limits the likelihood of widespread exploitation. The vulnerability does not affect system integrity or availability, so operational disruption is unlikely. Organizations with strict physical security controls and policies limiting access to peripherals will be less impacted. Nonetheless, in shared or less controlled environments, the risk of data leakage through Bluetooth traffic interception increases. The vulnerability also underscores the need for organizations to maintain up-to-date firmware on peripherals to mitigate such risks. Since the Magic Keyboard is a popular accessory among Apple users, organizations heavily invested in Apple hardware may have a larger attack surface. The low CVSS score reflects the limited impact and exploitability, but the confidentiality breach potential should not be ignored in sensitive contexts.

Mitigation Recommendations

1. Ensure all Apple Magic Keyboards are updated to firmware version 2.0.6 or later, which contains the fix for this vulnerability. 2. Implement strict physical security controls to prevent unauthorized physical access to peripherals, especially in sensitive or high-risk areas. 3. Regularly audit and inventory all Bluetooth-enabled peripherals to identify devices that may be vulnerable or out of date. 4. Educate employees about the risks of leaving peripherals unattended in public or shared spaces. 5. Consider using additional endpoint security solutions that monitor Bluetooth device connections and detect anomalous behavior. 6. For environments with extremely sensitive data, consider restricting the use of wireless keyboards or using wired alternatives to eliminate Bluetooth attack vectors. 7. Monitor for any unusual Bluetooth traffic patterns that could indicate interception attempts. 8. Coordinate with Apple support channels to receive timely notifications about firmware updates and security advisories related to peripherals.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apple
Date Reserved
2024-01-03T22:26:44.836Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034b182aa0cae27e666e

Added to database: 6/3/2025, 2:14:35 PM

Last enriched: 7/4/2025, 3:26:27 PM

Last updated: 7/26/2025, 12:00:12 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats