New series of Bluetooth vulnerabilities discovered that could put millions of Windows and Android devices worldwide in trouble
Bluetooth is a connection technology that has appeared for a long time and is probably no stranger to each of us. Bluetooth connectivity makes it easy to move files, photos, and documents between technology devices, as well as connect and exchange data between a main device and peripheral devices within a certain distance.
But besides the undisputed convenience, this connectivity technology has inadvertently raised issues of data security and privacy at the individual level. Hackers can easily take advantage of existing vulnerabilities in the Bluetooth protocol to deploy many different violating activities.
Recently, a 'collection' of security vulnerabilities has been discovered to exist in many Bluetooth chipset systems being equipped on products of a series of popular OEM SoCs. The list includes Intel, Qualcomm, Texas Instruments, Infineon (Cypress), Silicon Labs and many big names. Therefore, the number of affected devices worldwide will be extremely large, difficult to measure accurately.
This series of security vulnerabilities is called BrakTooth, and was first discovered by a team of researchers from the Singapore University of Technology and Design, after analyzing 13 Bluetooth devices from the major SoC vendors mentioned above.
The impact from BrakTooth vulnerabilities is also varied. From damaging the target device using specially crafted Bluetooth Link Manager Protocol packets, to the most dangerous of arbitrary code execution (CVE-2021-28139).
According to preliminary investigation results, the BrakTooth vulnerabilities are confirmed to exist in the products of at least 11 manufacturers, but can affect 1,400 different Bluetooth chipsets. These chips are equipped on many popular technology products such as smartphones (Pocophone F1, Oppo Reno 5G.), laptops (Dell Optiplex, Alienware.), desktop computers (Dell Optiplex, Alienware.). Microsoft Surface Go 2, Pro 7, Book 3…), audio devices (speakers and headphones), home entertainment systems, and even toys.
Currently Expressif, Infineon and Bluetrum have released patches, while other OEMs are still actively investigating the issue.
While the patch has not been released, security vendors recommend that you temporarily limit Bluetooth use, and turn off Bluetooth connectivity when not in use.
Video demo of the BrakTooth vulnerability hacking process:
You should read it
- Discovering more vulnerabilities makes Bluetooth devices vulnerable to malicious attacks
- What is Bluetooth 5.0? What benefits does it have for our lives?
- Instructions for using Bluetooth on devices
- Do you know what Bluetooth on TV is for?
- Top 6 USB Bluetooth for the best PC
- The 'Bluetooth 4.2' technology standard was released
- Learn about Bluetooth technology
- How to Use USB Bluetooth
May be interested
- A programmer discovers a security hole that could bring down the global systemat the end of march, andres freund discovered a backdoor hidden in a software part of the linux operating system that could lead hackers to access hundreds of millions of computers worldwide.
- Instructions on how to set up Bluetooth on Windows 10bluetooth is no longer the type of technology that only addicted people know. now you can find it on any device, from a phone to a car ... so, turning on bluetooth on windows will be more useful than ever when it can connect to multiple devices.
- What is Bluetooth? Useful information about Bluetooth technologymany devices today incorporate bluetooth technology to enable wireless communication with other bluetooth devices. before using bluetooth, it is important to understand what this technology is and the security risks that may come with it, as well as how to avoid or protect yourself from these risks.
- Phones from 11 manufacturers may be attacked by hidden AT commandsresearchers have found that millions of mobile devices come from 11 smartphone manufacturers that can be attacked by at commands.
- An extremely dangerous vulnerability on Android phones allows bad guys to track users even when the phone is off the screencamera apps on android phones all have this flaw, which poses a threat to hundreds of millions of users.
- How to Automatically Connect to Preferred Bluetooth Devices and Networks on Androidhave you ever felt annoyed when your phone connects to the wrong wi-fi or bluetooth device?
- How to find lost Bluetooth devicesbluetooth devices with more and more compact designs mean they are also easier to lose
- How to use Bluetooth on the simplest iPhonealthough the way it works is not very similar to bluetooth on android devices, bluetooth on iphone still does its job well. here is the article that shows you how to use bluetooth on iphone.
- Learn about Bluetooth technologytoday, many devices are tightly coupled with bluetooth technology to enable wireless communication with other bluetooth devices. before using bluetooth, we should find out what this technology is and the security risks that may occur with it, as well as measures to avoid or protect you from these risks.
- Instructions for turning on and off Bluetooth on Windows 10if you're having trouble turning bluetooth on and off on your windows 10 pc, tipsmake.com has put together some of the simplest ways.