Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short range connectivity in the vast majority of devices in the market.
If you are having Bluetooth enabled devices then you are vulnerable to BlueBorne attack. This attack spreads through the air and attacks Bluetooth devices. All the Bluetooth devices mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux are vulnerable.
BlueBorne Attack Explained
This attack leads attackers to gain complete control over your device and from your device they can migrate to corporate networks and even to most secured Air-gapped computers.
Also Read Everything you Need to Know About The Evolution of Locky Ransomware
Security Experts from Armis Labs has identified eight vulnerabilities which can be the part of the attack vector and they published a Whitepaper.
1. Linux kernel RCE vulnerability – CVE-2017-1000251
2. Linux Bluetooth stack (BlueZ) information Leak vulnerability – CVE-2017-1000250
3. Android information Leak vulnerability – CVE-2017-0785
4. Android RCE vulnerability #1 – CVE-2017-0781
5. Android RCE vulnerability #2 – CVE-2017-0782
6. The Bluetooth Pineapple in Android – Logical Flaw CVE-2017-0783
7. The Bluetooth Pineapple in Windows – Logical Flaw CVE-2017-8628
8. Apple Low Energy Audio Protocol RCE vulnerability – CVE-2017-14315
The worst part of the attacks is that user not required to set in discoverable mode or to be paired with attackers device and later not required to Authorize the connection.
Linux Take Over
Armis said Previous works focused on finding potential issues in the Bluetooth specification itself, showing the weakness of the encryption key exchange procedures in Bluetooth versions. But these new vulnerabilities are at the execution level, bypassing the various authentication mechanisms, and empowering a total takeover of the target device.
Unlike Android and Windows, iOS does not allow silent authentication to take place via “Just Works” – once an attacker attempts authentication through “Just Works”, the user of the targeted device is informed that a device has initiated pairing with it, and only if the user authorizes the pairing the authentication will succeed.
Android Take Over
All Android phones, tablets, and wearables of all versions are affected and no security patches yet released for Android versions.
Windows versions still Windows Vista are affected and for Windows phones, Microsoft released a Security patch today.
Windows MiTM
All the devices with iPhone and iPad devices less than version iOS 9.3.5 are affected and the issue fixed with iOS 10.And AppleTV with version 7.2.2 and lower are affected.
Also read A Highly Sophisticated Victim’s Activities Monitoring Android Spyware “Notorious Pegasus” Discovered
Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…
The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…
A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…
Meta has announced the removal of over 2 million accounts connected to malicious activities, including…
Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…
A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…