HT TECH wants to start sending you push notifications. Click allow to subscribe

Bluetooth vulnerability puts millions of devices at risk: Here’s what you should do

The loophole found in Bluetooth allows cyber criminals to intercept and decrypt and/or forge and inject device messages. Here’s everything you need to know about the Bluetooth vulnerability.

By: KUL BHUSHAN
Updated on: Aug 20 2022, 10:00 IST
Using a Bluetooth device? Here’s what you need to know about the latest security vulnerability (REUTERS)

A new vulnerability found in commonly available Bluetooth has put millions of devices on risk. The vulnerability allows a cyber criminal to intercept and monitor the data exchanged from a device in proximity. This loophole affects devices from Broadcom, Qualcomm, Intel, and Apple among others. Many Android handsets may also be at risk.

Bluetooth SIG, the official regulator for Bluetooth wireless technology, earlier this week published a detailed report about the vulnerability in two Bluetooth features - Secure Simple Pairing and LE Secure Connections.

You may be interested in

Mobiles Tablets Laptops
7% OFF
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
₹148,900₹159,900
Buy now
23% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
₹115,999₹149,999
Buy now
5% OFF
Apple iPhone 15 Plus 256GB
  • Black
  • 6 GB RAM
  • 256 GB Storage
₹94,900₹99,900
Buy now
9% OFF
Apple iPhone 15 256GB
  • Black
  • 6 GB RAM
  • 256 GB Storage
₹90,990₹99,900
Buy now
Apple MacBook Pro M3 MR7J3HN A Ultrabook
  • Silver
  • 8 GB RAM
  • 512 GB SSD
₹169,900
Buy now
Apple MacBook Air M2 MQKQ3HN A Ultrabook
  • Space Grey
  • 8 GB RAM
  • 512 GB SSD
₹134,900
Buy now
Apple MacBook Pro M2 MNEH3HN A Ultrabook
  • Space Grey
  • 8 GB RAM
  • 256 GB SSD
₹100,000
Buy now
Apple MacBook Pro MXK32HN A Ultrabook
  • Space Grey
  • 8 GB RAM
  • 256 GB SSD
₹100,000
Buy now
3% OFF
Apple iPad Pro 11 2022 WiFi 1TB
  • Silver
  • 16 GB RAM
  • 1 TB Storage
₹147,328₹151,900
Buy now
3% OFF
Apple iPad Pro 12 9 2022 WiFi plus Cellular 256GB
  • Silver
  • 8 GB RAM
  • 256 GB Storage
₹133,750₹137,900
Buy now
Apple iPad Pro 11 2022 WiFi plus Cellular 512GB
  • Silver
  • 8 GB RAM
  • 512 GB Storage
₹126,900
Buy now
3% OFF
Apple iPad Pro 12 9 2022
  • Silver
  • 8 GB RAM
  • 128 GB Storage
₹124,051₹127,900
Buy now

What is the loophole?
"The researchers identified that the Bluetooth specification recommends, but does not require, that a device supporting the Secure Simple Pairing or LE Secure Connections features validate the public key received over the air when pairing with a new device. It is possible that some vendors may have developed Bluetooth products that support those features but do not perform public key validation during the pairing procedure. In such cases, connections between those devices could be vulnerable to a man-in-the-middle attack that would allow for the monitoring or manipulation of traffic," Bluetooth SIG said on its website.

Also read: Looking for a smartphone? To check mobile finder click here.

"For an attack to be successful, an attacking device would need to be within wireless range of two vulnerable Bluetooth devices that were going through a pairing procedure. The attacking device would need to intercept the public key exchange by blocking each transmission, sending an acknowledgement to the sending device, and then injecting the malicious packet to the receiving device within a narrow time window. If only one device had the vulnerability, the attack would not be successful."

How does it work?
According to CERT, a cyber criminal within the range of the affected device may be able to leverage "a man-in-the-middle network" position to find out "cryptographic keys" users by the device. The criminal can then access monitor and modify the device content.

"Bluetooth utilizes a device pairing mechanism based on elliptic-curve Diffie-Hellman (ECDH) key exchange to allow encrypted communication between devices. The ECDH key pair consists of a private and a public key, and the public keys are exchanged to produce a shared pairing key. The devices must also agree on the elliptic curve parameters being used. Previous work on the "Invalid Curve Attack" showed that the ECDH parameters are not always validated before being used in computing the resulted shared key, which reduces attacker effort to obtain the private key of the device under attack if the implementation does not validate all of the parameters before computing the shared key," said CERT on its website.

"In some implementations, the elliptic curve parameters are not all validated by the cryptographic algorithm implementation, which may allow a remote attacker within wireless range to inject an invalid public key to determine the session key with high probability. Such an attacker can then passively intercept and decrypt all device messages, and/or forge and inject malicious messages."

The reason these attack works is that, in order to communicate, pairing needs to be done for communication between both the devices, then they agree on a certain parameter. Following which they produce their keys and while making a connection the Bluetooth devices don't validate the parameters properly or sufficiently, explains Rahul Tyagi, Co-Founder & VP, Lucideus.

"For a hacker to hack or sniff the bluetooth connection or network, the hacker's bluetooth device through which the attack would be conducted needs to be in range of both the victim bluetooth devices. Hacker's bluetooth device must also intercept the key exchanges between the victim bluetooth devices and that can only be done by blocking the transmission, sending an acknowledgement packet to the sending device and then injecting malicious packet to the receiving device. This needs to be done within a certain amount of time. Both the devices need to be vulnerable for this attack to work," he added.

Who has been affected?
According to the CERT list, devices from Apple, Intel and Qualcomm have been affected by the Bluetooth vulnerability. It is worth noting that Apple and Intel have already released firmware and software updates to fix the vulnerability. It is not known whether Google, Android Open Source Project (AOSP) and Linux have also been affected. Microsoft isn't part of the list.

List of affected vendors. (CERT)
List of affected vendors. (CERT)

What should users do?
If you're using a Qualcomm or Apple device, you should immediately install the latest firmware or software update.

"While there are no confirmed mass reports of the newly discovered Bluetooth vulnerability being exploited on scale, this vulnerability could be taken of advantage of silently if consumers are not using the patched version over time. As Bluetooth is a globally used framework, it's a very attractive target for hackers and its scale and spread enhances its vulnerability," said Farrhad Acidwalla, founder of CYBERNETIV, an enterprise-security focused company.

"From an affected end user's security viewpoint, wistfully there is not much one can do except to make sure they are on the latest software update from their manufacturer or alternatively turn off Bluetooth if their device is susceptible and has not received an update," he added.

Rahul recommends that users should keep Bluetooth turned off if they're not in use. "By doing this user's can avoid unwanted pairing or connections, also when Bluetooth is left on Bluetooth packets are broadcasted which contains Bluetooth hardware details which make it easier to track the victim so by turning Bluetooth off users can avoid being tracked or hacked. And they should make sure that they are updated with the latest security updates released by the manufacturer," he said.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on ,Twitter, Facebook, , and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 25 Jul, 16:14 IST

Sale

Mobiles Tablets Laptops
9% OFF
Apple iPhone 13 512GB
  • Blue
  • 4 GB RAM
  • 512 GB Storage
₹81,900₹89,900
Buy now
12% OFF
Apple iPhone 15
  • Black
  • 6 GB RAM
  • 128 GB Storage
₹70,500₹79,900
Buy now
5% OFF
Apple iPhone 15 Pro
  • Black Titanium
  • 8 GB RAM
  • 128 GB Storage
₹127,990₹134,900
Buy now
7% OFF
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
₹148,900₹159,900
Buy now
9% OFF
Apple iPad Pro 12 9 2021 WiFi plus Cellular 512GB
  • Silver
  • 8 GB RAM
  • 512 GB Storage
₹129,999₹142,900
Buy now
8% OFF
Apple iPad Air 2020
  • Space Gray
  • 4 GB RAM
  • 64 GB Storage
₹45,999₹49,900
Buy now
4% OFF
Apple iPad Pro 11 WiFi Cellular 512GB
  • Silver
  • 4 GB RAM
  • 512 GB Storage
₹106,999₹111,900
Buy now
4% OFF
Apple iPad Pro 11 WiFi 512GB
  • Silver
  • 4 GB RAM
  • 512 GB Storage
₹106,999₹111,900
Buy now
23% OFF
Infinix INBook X1 Neo XL22 Laptop Intel Celeron Quad Core 8 GB 256 GB SSD Windows 11
  • Blue
  • 4 GB RAM
  • 128 GB SSD
₹22,990₹29,990
Buy now
33% OFF
Asus VivoBook Go 15 OLED E1504GA NJ323WS Laptop
  • Green Grey
  • 8 GB RAM
  • 512 GB SSD
₹33,990₹50,990
Buy now
37% OFF
Asus ROG Strix Scar 15 G532LW AZ056T Laptop
  • Black
  • 16 GB RAM
  • 1 TB SSD
₹146,200₹231,990
Buy now
24% OFF
Asus ROG Strix G15 G513RC HN063W Laptop
  • Electro Punk
  • 16 GB RAM
  • 512 GB SSD
₹66,500₹86,990
Buy now