Original Article Text

Click to Toggle View

Bluetooth flaws could let hackers spy through your microphone. Vulnerabilities affecting a Bluetooth chipset present in more than two dozen audio devices from ten vendors can be exploited for eavesdropping or stealing sensitive information. Researchers confirmed that 29 devices from Beyerdynamic, Bose, Sony, Marshall, Jabra, JBL, Jlab, EarisMax, MoerLabs, and Teufel are affected. The list of impacted products includes speakers, earbuds, headphones, and wireless microphones. The security problems could be leveraged to take over a vulnerable product and on some phones, an attacker within connection range may be able to extract call history and contacts. Snooping over a Bluetooth connection At the TROOPERS security conference in Germany, researchers at cybersecurity company ERNW disclosed three vulnerabilities in the Airoha systems on a chip (SoCs), which are widely used in True Wireless Stereo (TWS) earbuds. The issues are not critical and besides close physical proximity (Bluetooth range), their exploitation also requires “a high technical skill set.” They received the following identifiers: ERNW researchers say they created a proof-of-concept exploit code that allowed them to read the currently playing media from the targeted headphones. While such an attack may not present a great risk, other scenarios leveraging the three bugs could let a threat actor hijack the connection between the mobile phone and an audio Bluetooth device and use the Bluetooth Hands-Free Profile (HFP) to issue commands to the phone. “The range of available commands depends on the mobile operating system, but all major platforms support at least initiating and receiving calls” - ERNW The researchers were able to trigger a call to an arbitrary number by extracting the Bluetooth link keys from a vulnerable device’s memory. They say that depending on the phone’s configuration, an attacker could also retrieve the call history and contacts. They were also able to initiate a call and "successfully eavesdrop on conversations or sounds within earshot of the phone." Furthermore, the vulnerable device’s firmware could potentially be rewritten to enable remote code execution, thereby facilitating the deployment of a wormable exploit capable of propagating across multiple devices. Attack restrictions apply Although the ERNW researchers present serious attack scenarios, practical implementation at scale is constrained by certain limitations. “Yes — the idea that someone could hijack your headphones, impersonate them towards your phone, and potentially make calls or spy on you, sounds pretty alarming.” “Yes — technically, it is serious,” the researchers say, adding that “real attacks are complex to perform.” The necessity of both technical sophistication and physical proximity confines these attacks to high-value targets, such as those in diplomacy, journalism, activism, or sensitive industries. Airoha has released an updated SDK incorporating necessary mitigations, and device manufacturers have started patch development and distribution. Nevertheless, German publication Heise says that the most recent firmware updates for more than half of the affected devices are from May 27 or earlier, which is before Airoha delivered the updated SDK to its customers. Why IT teams are ditching manual patch management Patching used to mean complex scripts, long hours, and endless fire drills. Not anymore. In this new guide, Tines breaks down how modern IT orgs are leveling up with automation. Patch faster, reduce overhead, and focus on strategic work -- no complex scripts required.

Daily Brief Summary

CYBERCRIME // Bluetooth Chipset Vulnerabilities Expose Audio Devices to Eavesdropping

Researchers at ERNW discovered three vulnerabilities in Airoha Bluetooth chipsets used in various audio devices, affecting brands like Beyerdynamic, Bose, and Sony.

These flaws potentially allow attackers within Bluetooth range to eavesdrop or steal sensitive information from 29 different audio products including earbuds, speakers, and headphones.

The vulnerabilities require high technical skills for exploitation and physical proximity to the targeted device.

Attack scenarios could enable hackers to hijack Bluetooth connections, issue phone commands, or even initiate calls without the user's knowledge.

The researchers were also able to prove a concept where they could retrieve currently playing media information and discuss potential for remote code execution and deployment of a wormable exploit.

Despite the potential severity, practical attacks are complex and likely confined to high-value targets due to the requirement for proximity and technical expertise.

Airoha has issued an updated SDK to address these vulnerabilities, but many device manufacturers have yet to release patches incorporating these mitigations.