Wednesday, April 16, 2025
HomeWireless AttacksExploit Released for Critical BlueBorne Vulnerability that Reveals Nearly All Connected Device

Exploit Released for Critical BlueBorne Vulnerability that Reveals Nearly All Connected Device

Published on

SIEM as a Service

Follow Us on Google News

Before a week security experts from Armis Labs revealed a new attack BlueBorne that affects Nearly All Connected Device. Simply to say if you are having Bluetooth enabled devices then you are vulnerable to BlueBorne attack.

Read More Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack

Affected Devices – BlueBorne

All the Bluetooth devices mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux are vulnerable.

- Advertisement - Google News

Android

All Android Devices Phones, tablets, wearables are affected, some of the example devices.

  • Google Pixel
  • Samsung Galaxy
  • Samsung Galaxy Tab
  • LG Watch Sport
  • Pumpkin Car Audio System

Windows

All the windows version Since Windows Vista are infected and Microsoft issued a patch for it on July 11, 2017.

Linux

All Linux running BlueZ are affected with information Leakage and version 3.3-rc1 with remote code Execution. Example devices

  • Samsung Gear S3 (Smartwatch)
  • Samsung Smart TVs
  • Samsung Family Hub (Smart refrigerator)

iOS

All the devices with iPhone and iPad devices less than version iOS 9.3.5 are affected and the issue fixed with iOS 10.And AppleTV with version 7.2.2 and lower are affected.

Exploit – BlueBorne

Exploit released by user ojasookert in GitHub. Now you can exploit your Android Devices for vulnerability CVE-2017-0785.

We should have Prerequisites installed Package: libbluetooth-dev to use BlueZ Linux Bluetooth stack.

sudo apt-get install bluetooth libbluetooth-dev
sudo pip install pybluez
sudo pip install pwntools

You can use Blueborne Android Scanner to scan for blueborne-vulnerable Android devices. Once you have found the device and have prerequisites installed you can launch the attack by typing following command.

python CVE-2017-0785.py TARGET=XX:XX:XX:XX:XX:XX

Before Performing this Test, make sure Bluetooth has Turned On and visible with your Target Device.

Defences

  • Disable Bluetooth as soon as you complete the process, turn it on only when it is required.
  • Now Android users can check their devices and device around them for vulnerability with the app BlueBorne Detector.
Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Responding To And Recovering From Physical Security Breaches

Unfortunately, data breaches and similarly related physical security threats are something of an eventuality...

Hijacker v1.3 – A Complete Wi-Fi Hacking Tool Kit for Android

The hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng,...

Wifi cracker – Pentesting Wifi Network with Fern WiFi Password Auditing Tool

A WiFi cracker is a software tool or program that is designed to exploit...