Bluetooth is the leading and most widespread protocol for short-range communications.It is the backbone of short range connectivity in the vast majority of devices in the market.
If you are having Bluetooth enabled devices then you are vulnerable to BlueBorne attack. This attack spreads through the air and attacks Bluetooth devices. All the Bluetooth devices mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux are vulnerable.
BlueBorne Attack Explained
This attack leads attackers to gain complete control over your device and from your device they can migrate to corporate networks and even to most secured Air-gapped computers.
Also Read Everything you Need to Know About The Evolution of Locky Ransomware
Security Experts from Armis Labs has identified eight vulnerabilities which can be the part of the attack vector and they published a Whitepaper.
1. Linux kernel RCE vulnerability – CVE-2017-1000251
2. Linux Bluetooth stack (BlueZ) information Leak vulnerability – CVE-2017-1000250
3. Android information Leak vulnerability – CVE-2017-0785
4. Android RCE vulnerability #1 – CVE-2017-0781
5. Android RCE vulnerability #2 – CVE-2017-0782
6. The Bluetooth Pineapple in Android – Logical Flaw CVE-2017-0783
7. The Bluetooth Pineapple in Windows – Logical Flaw CVE-2017-8628
8. Apple Low Energy Audio Protocol RCE vulnerability – CVE-2017-14315
The worst part of the attacks is that user not required to set in discoverable mode or to be paired with attackers device and later not required to Authorize the connection.
Linux Take Over
Armis said Previous works focused on finding potential issues in the Bluetooth specification itself, showing the weakness of the encryption key exchange procedures in Bluetooth versions. But these new vulnerabilities are at the execution level, bypassing the various authentication mechanisms, and empowering a total takeover of the target device.
Unlike Android and Windows, iOS does not allow silent authentication to take place via “Just Works” – once an attacker attempts authentication through “Just Works”, the user of the targeted device is informed that a device has initiated pairing with it, and only if the user authorizes the pairing the authentication will succeed.
Android Take Over
All Android phones, tablets, and wearables of all versions are affected and no security patches yet released for Android versions.
Windows versions still Windows Vista are affected and for Windows phones, Microsoft released a Security patch today.
Windows MiTM
All the devices with iPhone and iPad devices less than version iOS 9.3.5 are affected and the issue fixed with iOS 10.And AppleTV with version 7.2.2 and lower are affected.
Also read A Highly Sophisticated Victim’s Activities Monitoring Android Spyware “Notorious Pegasus” Discovered
The Evasive Panda group deployed a new C# framework named CloudScout to target a Taiwanese…
Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in…
The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against…
Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to…
A security researcher discovered a vulnerability in Windows theme files in the previous year, which…
The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to…