Your data. Your choice.

If you select «Essential cookies only», we’ll use cookies and similar technologies to collect information about your device and how you use our website. We need this information to allow you to log in securely and use basic functions such as the shopping cart.

By accepting all cookies, you’re allowing us to use this data to show you personalised offers, improve our website, and display targeted adverts on our website and on other websites or apps. Some data may also be shared with third parties and advertising partners as part of this process.

News + Trends

Bluetooth needs filling: smart devices found vulnerable when pairing

Martin Jud
22.5.2020
Translation: Eva Francis

Almost every Bluetooth device is vulnerable. When pairing two devices, a security flaw allows potential attackers to impersonate one device and gain access. All devices are affected – from iPhone to Raspberry Pi and from lamps to routers and refrigerators.

In theory, authentication mechanisms based on a long-term pairing key are supposed to make sure devices with the Bluetooth standard are protected against impersonation attacks. But they’re not, as the security mechanism is flawed.

Three security researchers from ETH Lausanne, the University of Oxford and the Helmholtz Centre for Information Security (CISPA) have discovered security gaps in Bluetooth and have proved this by attacking 30 devices with 28 different chips. The vulnerabilities were reported to the Bluetooth Special Interest Group (SIG) last December, who adapted the Bluetooth Core Specification accordingly.

As the security researchers' documentation shows, all Bluetooth protocols are affected. The problem is due to the fact that when pairing, only the Bluetooth master checks the correctness of the exchanged security key. There’s no mutual authentication method. The security researchers call their attack on Bluetooth Impersonation AttackS, or BIAS for short. As they explain in a short video, BIAS allows the attacker to impersonate any master or slave device.

It’s unclear whether the security vulnerabilities are or have been actively exploited. How to stay safe? Keep in mind that the reception range of Bluetooth is around ten metres. Whether and when manufacturers will provide or have already provided firmware to patch the gaps is currently unknown. If your device hasn’t been updated since December 2019, it’s likely vulnerable. If it has been updated, your device might or might not be affected – there’s no way to tell due to a lack of information from the manufacturers.

102 people like this article


User Avatar
User Avatar

I find my muse in everything. When I don’t, I draw inspiration from daydreaming. After all, if you dream, you don’t sleep through life.


News + Trends

From the latest iPhone to the return of 80s fashion. The editorial team will help you make sense of it all.

Show all

27 comments

Avatar
later