Sunday, May 5, 2024

Exploit Released for Critical BlueBorne Vulnerability that Reveals Nearly All Connected Device

Before a week security experts from Armis Labs revealed a new attack BlueBorne that affects Nearly All Connected Device. Simply to say if you are having Bluetooth enabled devices then you are vulnerable to BlueBorne attack.

Read More Vulnerability Puts More Than 5 Billion Bluetooth Enabled Devices Under Attack

Affected Devices – BlueBorne

All the Bluetooth devices mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux are vulnerable.

Android

All Android Devices Phones, tablets, wearables are affected, some of the example devices.

  • Google Pixel
  • Samsung Galaxy
  • Samsung Galaxy Tab
  • LG Watch Sport
  • Pumpkin Car Audio System

Windows

All the windows version Since Windows Vista are infected and Microsoft issued a patch for it on July 11, 2017.

Linux

All Linux running BlueZ are affected with information Leakage and version 3.3-rc1 with remote code Execution. Example devices

  • Samsung Gear S3 (Smartwatch)
  • Samsung Smart TVs
  • Samsung Family Hub (Smart refrigerator)

iOS

All the devices with iPhone and iPad devices less than version iOS 9.3.5 are affected and the issue fixed with iOS 10.And AppleTV with version 7.2.2 and lower are affected.

Exploit – BlueBorne

Exploit released by user ojasookert in GitHub. Now you can exploit your Android Devices for vulnerability CVE-2017-0785.

We should have Prerequisites installed Package: libbluetooth-dev to use BlueZ Linux Bluetooth stack.

sudo apt-get install bluetooth libbluetooth-dev
sudo pip install pybluez
sudo pip install pwntools

You can use Blueborne Android Scanner to scan for blueborne-vulnerable Android devices. Once you have found the device and have prerequisites installed you can launch the attack by typing following command.

python CVE-2017-0785.py TARGET=XX:XX:XX:XX:XX:XX

Before Performing this Test, make sure Bluetooth has Turned On and visible with your Target Device.

Defences

  • Disable Bluetooth as soon as you complete the process, turn it on only when it is required.
  • Now Android users can check their devices and device around them for vulnerability with the app BlueBorne Detector.
Website

Latest articles

Ex-Cybersecurity Consultant Jailed For Trading Confidential Data

Vincent Cannady, a professional who used to work as a consultant in the cybersecurity...

Mal.Metrica Malware Hijacks 17,000+ WordPress Sites

Infected websites mimic legitimate human verification prompts (CAPTCHAs) to trick users, who often request...

Hackers Exploit Microsoft Graph API For C&C Communications

An emerging threat leverages Microsoft's Graph API to facilitate command-and-control (C&C) communications through Microsoft...

ApacheMQ Authentication Flaw Let Unauthorized Users Perform Multiple Actions

Apache ActiveMQ is a Java based communication management tool for communicating with multiple components...

68% of Data Breach Occurs Due to Social Engineering Attacks

In the latest edition of Verizon's Data Breach Investigations Report (DBIR) for 2024, a...

U.S. Govt Warns of Massive Social Engineering Attack from North Korean Hackers

The United States government has issued a stark warning about a new wave of...

Cisco IP Phone Vulnerability Let Attackers Trigger DoS Attack

Cisco has disclosed multiple vulnerabilities in its IP Phone firmware that could severely impact...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles