News

New Bluetooth Security Flaws Pose Threat To Devices, Including Apple’s AirDrop

Bluetooth Security
These security flaws are not tied to specific hardware or software configurations but are inherent to the Bluetooth architecture itself

Security researchers from Eurecom have recently identified critical security vulnerabilities in Bluetooth technology, impacting devices using Bluetooth versions 4.2 to 5.4. The affected devices include those manufactured from late 2014 to the present date, with Apple devices, particularly those using AirDrop, being at a heightened risk.

The research, conducted by expert Daniele Antonioli, reveals six distinct exploits collectively known as ‘BLUFFS.’ These exploits open the door for potential device impersonation and man-in-the-middle (MitM) attacks. The vulnerabilities compromise the confidentiality of Bluetooth sessions, enabling attackers within Bluetooth range to decode or manipulate data by posing as one of the connected devices.

The impact of these flaws extends across a wide range of devices, including laptops, PCs, smartphones, and tablets. According to the research paper, all Bluetooth-enabled devices are susceptible to at least three out of the six BLUFFS attacks.

To stay safe, users are advised to disable Bluetooth on their mobile devices when not in use. This precautionary measure involves enabling Bluetooth only when necessary, such as when using Bluetooth headphones, and disabling it afterward.

Notably, these security flaws are not tied to specific hardware or software configurations but are inherent to the Bluetooth architecture itself. Antonioli explains that BLUFFS exploit two previously undiscovered flaws in the Bluetooth standard related to the derivation of session keys for decrypting exchanged data.

In response to the findings, the researchers have shared a toolkit on GitHub, demonstrating the effectiveness of BLUFFS. The toolkit includes a Python script for testing the attacks, ARM patches, a parser, and PCAP samples captured during their experiments.

The widespread impact of these Bluetooth vulnerabilities raises concerns about the security of wireless connections, emphasising the need for users to stay vigilant and adopt best practices to mitigate potential risks.

Leave a Reply

Your email address will not be published. Required fields are marked *