CVE-2024-0230
Description
A session management issue was addressed with improved checks. This issue is fixed in Magic Keyboard Firmware Update 2.0.6. An attacker with physical access to the accessory may be able to extract its Bluetooth pairing key and monitor Bluetooth traffic.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A session management flaw in Apple Magic Keyboard firmware 2.0.6 could allow an attacker with physical access to extract the Bluetooth pairing key and monitor traffic.
A session management issue exists in Apple Magic Keyboard firmware versions prior to 2.0.6. The vulnerability stems from insufficient checks during the Bluetooth pairing process, potentially allowing an attacker with physical access to the accessory to extract its Bluetooth pairing key [1].
The attack requires physical access to the keyboard, meaning an attacker must be in possession of the device or have close proximity to interact with its hardware. No additional authentication or user interaction is needed beyond the attacker's physical proximity [1][2].
If exploited, an attacker could use the extracted pairing key to monitor Bluetooth traffic between the keyboard and the paired host device. This could lead to information disclosure of keystrokes or other data transmitted over the Bluetooth connection, compromising the confidentiality of user input [1][2].
Mitigation
Apple has released Magic Keyboard Firmware Update 2.0.6, which addresses the session management issue with improved checks. Users are advised to update their Magic Keyboard firmware via the System Settings on Mac or through the Bluetooth settings on iOS/iPadOS to apply the patch [1][2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- cpe:2.3:o:apple:magic_keyboard_firmware:*:*:*:*:*:*:*:*Range: <2.0.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- support.apple.com/en-us/HT214050nvdRelease NotesThird Party Advisory
- support.apple.com/en-us/120303nvd
- support.apple.com/kb/HT214050nvd
News mentions
0No linked articles in our index yet.