Categories: CVE/vulnerability

Critical BlueBorne Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack

Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short range connectivity in the vast majority of devices in the market.

If you are having Bluetooth enabled devices then you are vulnerable to BlueBorne attack. This attack spreads through the air and attacks Bluetooth devices. All the Bluetooth devices mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux are vulnerable.

                                              BlueBorne Attack Explained

This attack leads attackers to gain complete control over your device and from your device they can migrate to corporate networks and even to most secured Air-gapped computers.

Also Read Everything you Need to Know About The Evolution of Locky Ransomware

Security Experts from Armis Labs has identified eight vulnerabilities which can be the part of the attack vector and they published a Whitepaper.

1. Linux kernel RCE vulnerability – CVE-2017-1000251
2. Linux Bluetooth stack (BlueZ) information Leak vulnerability – CVE-2017-1000250
3. Android information Leak vulnerability – CVE-2017-0785
4. Android RCE vulnerability #1 – CVE-2017-0781
5. Android RCE vulnerability #2 – CVE-2017-0782
6. The Bluetooth Pineapple in Android – Logical Flaw CVE-2017-0783
7. The Bluetooth Pineapple in Windows – Logical Flaw CVE-2017-8628
8. Apple Low Energy Audio Protocol RCE vulnerability – CVE-2017-14315

The worst part of the attacks is that user not required to set in discoverable mode or to be paired with attackers device and later not required to Authorize the connection.

                                                       Linux Take Over

Armis said Previous works focused on finding potential issues in the Bluetooth specification itself, showing the weakness of the encryption key exchange procedures in Bluetooth versions. But these new vulnerabilities are at the execution level, bypassing the various authentication mechanisms, and empowering a total takeover of the target device.

Security patches

Unlike Android and Windows, iOS does not allow silent authentication to take place via “Just Works” – once an attacker attempts authentication through “Just Works”, the user of the targeted device is informed that a device has initiated pairing with it, and only if the user authorizes the pairing the authentication will succeed.

                                                        Android Take Over

All Android phones, tablets, and wearables of all versions are affected and no security patches yet released for Android versions.

Windows versions still Windows Vista are affected and for Windows phones, Microsoft released a Security patch today.

                                                        Windows MiTM

All the devices with iPhone and iPad devices less than version iOS 9.3.5 are affected and the issue fixed with iOS 10.And AppleTV with version 7.2.2 and lower are affected.

Defences

  • Disable Bluetooth as soon as you complete the process, turn it on only when it is required.
  • Now Android users can check their devices and device around them for vulnerability with the app BlueBorne Detector.

Also read A Highly Sophisticated Victim’s Activities Monitoring Android Spyware “Notorious Pegasus” Discovered

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

PAN-OS Command Injection Flaw Lets Hackers Execute Arbitrary Code Remotely

Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling authenticated…

1 second ago

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…

10 hours ago

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…

11 hours ago

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…

11 hours ago

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic,…

12 hours ago

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens

The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as…

12 hours ago