Monday, April 28, 2025
HomeCyber Security NewsNew Bluetooth Vulnerability Affected Millions of Devices that Allow Hackers to Steal...

New Bluetooth Vulnerability Affected Millions of Devices that Allow Hackers to Steal the Encryption key

Published on

SIEM as a Service

Follow Us on Google News

Newly discovered Bluetooth vulnerability in implemented firmware and operating system software drivers allows remote attackers could obtain the encryption key used by the vulnerable devices.

This vulnerability occurs due to Bluetooth devices are not sufficiently validated elliptic curve parameters when it used to generate public keys during a Diffie-Hellman key exchange

Encryption communication between two Bluetooth devices established by utilizes a device pairing mechanism based on elliptic-curve Diffie-Hellman (ECDH) key exchange.

- Advertisement - Google News

Last year Critical BlueBorne Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack.

This serious flaw leads an attacker to perform a Man-in-the-Middle attack to obtains the cryptographic keys used by the devices.

This Bluetooth Vulnerability affected the vendors such as Apple, Broadcom, Intel, Qualcomm, and possibly other hardware vendors.

How does This Bluetooth Vulnerability Works

ECDH key pair basically contains private and a public key that will be shared on both side to generate a shared Pair key and the device also should agree to use the elliptic curve parameters.

But in Some cryptographic algorithm implementation, the elliptic curve parameters are not all validated.

This leads to provide a high probability for attackers to inject the invalid public key to determine the session key.

Also once the obtain the session key, then an attacker can then passively intercept and decrypt all device messages or alter the message that is being transferred.

In other words, Bluetooth released a Statement,The researchers identified that the Bluetooth specification recommends, but does not require, that a device supporting the Secure Simple Pairing or LE Secure Connections features validate the public key received over the air when pairing with a new device. It is possible that some vendors may have developed Bluetooth products that support those features but do not perform public key validation during the pairing procedure. In such cases, connections between those devices could be vulnerable to a man-in-the-middle attack that would allow for the monitoring or manipulation of traffic. 

To perform a successful attack, both pairing devices should be within wireless range of two vulnerable Bluetooth devices.

Later attacker device will intercept both pairing devices by blocking the transmission and ending an acknowledgment to the sending device, and then be injecting the malicious packet to the receiving device.

Important Note is that the attack will not be successful If only one device had the vulnerability.

Bluetooth Vulnerability Affected Vendor Information 

This Bluetooth Vulnerability (CVE-2018-5383) has been notified to all the above-affected vendors. you can see here all the vendors security updates for this Bluetooth vulnerability.

VendorStatusDate NotifiedDate Updated
AppleAffected18 Jan 201823 Jul 2018
BroadcomAffected18 Jan 201819 Jun 2018
IntelAffected18 Jan 201823 Jul 2018
QUALCOMM IncorporatedAffected18 Jan 201806 Feb 2018
MicrosoftNot Affected06 Feb 201820 Jul 2018
Android Open Source ProjectUnknown18 Jan 201818 Jan 2018
Bluetooth SIGUnknown06 Feb 201806 Feb 2018
GoogleUnknown19 Mar 201819 Mar 2018
Linux KernelUnknown05 Mar 201805 Mar 2018
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...