ASA-201709-3 - log back

ASA-201709-3 created at 25 Sep 2019 19:32:14
Workaround
Impact
+ A remote attacker is able to use a specially crafted Bluetooth device to obtain sensitive information such as Bluetooth encryption keys.