Home  ›  News  ›

Bluetooth Bug Could Expose Devices to Attack; Patch Coming

Article Comments  

Jul 24, 2018, 7:42 AM   by Eric M. Zeman   @zeman_e

Researchers at the Israel Institute of Technology discovered a vulnerability in Bluetooth's Secure Simple Pairing and LE Secure Connections features that could lead to man-in-the-middle attacks. According to the researchers, the Bluetooth specification doesn't require devices with these features to validate the public key when pairing with new hardware. By not validating the key, it leaves the connection open to attack. In this case, the attacker would need to have a device within 30 meters and intercept the pairing procedure between two devices. The attacker's hardware could pose as the intended paired device, hijack the connection, and transmit malicious code. For this to work, both devices attempting to pair would need to have the Secure Simple Pairing or LE Secure Connections features enabled in their code, and the attacker's timing would have to be impeccable, according to the Bluetooth SIG. The bug impacts hardware from Apple, Broadcom, Intel, and Qualcomm, along with some Android handsets. According to ZDNet, Apple issued a patch for this bug in July. Intel and Qualcomm have updated their drivers, respectively, and some PC makers have begun to distribute the patches. LG and Huawei have said they'll include patches for the bug in security updates for their Android phones this month. Google has not mentioned the bug in any of its monthly security updates and it's not clear if the Android kernel, nor what other Android devices, are affected

more info at ZDNet »
more info at Bluetooth SIG »

Related

more news about:

LG
Apple
Huawei
Android
 

AD

Comments

This forum is closed.

This forum is closed.

No messages

 
 
Page  1  of 1

Subscribe to news & reviews with RSS Follow @phonescoop on Twitter Phone Scoop on Facebook Subscribe to Phone Scoop on YouTube Follow on Instagram

 

All content Copyright 2001-2019 Phone Factor, LLC. All Rights Reserved.
Content on this site may not be copied or republished without formal permission.