Researchers find security flaws in thousands of Bluetooth devices
16 vulnerabilities in Bluetooth protocols have been uncovered by researchers from Singapore University of Technology and Design (SUTD). In addition to causing a denial of service, the vulnerabilities can cause devices to crash and audio equipment to become unresponsive as well.
There were thirteen distinct Bluetooth devices with Bluetooth chips from dozens of various manufacturers, including Intel and Qualcomm, that were tested by the researchers.
Bluetooth version numbers ranged from 3.0 to 5.2, with 5.2 being the most recent. They uncovered sixteen new vulnerabilities, as well as twenty previously known flaws, according to the researchers. There were several devices that did not perform in accordance with the Bluetooth standard's standards and specifications.
The researchers were able to achieve arbitrary code execution on smart home devices that were running on the affected chips as a result of the vulnerabilities. A denial of service assault on laptops and cellphones, as well as the freezing of Bluetooth audio devices, were also possible.. According to the experts, these flaws are present in at least 1,400 different goods on the market.
"The vulnerabilities exist as a result of certain specifications of the standard, as well as the accompanying protocols, not being followed," the researchers explain. In order to safeguard yourself, researchers are currently recommending that you utilize Bluetooth in public places. "A potential hacker would have to be within range of the Bluetooth antenna in order to carry out attacks because the vulnerabilities are in the Bluetooth Classic protocol. When utilizing Bluetooth, it is essential that you remain alert of your surroundings "It has a certain ring to it. The researchers also advised that you examine the list of impacted chips and that you apply the fixes as soon as they are made available by the manufacturers.
The use of Bluetooth on these devices should be minimized to the greatest extent possible if the patches are not available or not given by the device manufacturers. The researchers rely on a proof of concept that will be published on October 20 in order to be completely certain that the vulnerabilities are present on a device. More information will be made available at that time.
It was reported to the chip manufacturers – including Intel, Qualcomm, Texas Instruments, Infineon, Espressif, Bluetrum Technology and Silicon Labs – who were all notified of the 16 vulnerabilities. According to reports, updates have already been released by Bluetrum Technology, Espressif, and Infineon. Some vulnerabilities are being investigated by Intel, Qualcomm, Actions, and Zhuhai Jieli Technology, according to reports. According to the researchers, Harman International and SiLabs, two manufacturers, have not commented as of the time of the publishing of their findings.
Japanese researchers achieve speed of 319Tbit/s over 3001km via fiber - 07/20/2021 08:27 AM
Researchers at the Japanese National IT Institute have established a new internet speed record using fiber optics. At long-distance 319Tbit/s transmission was obtained by the researchers....
AMD Announces Worlds Fastest MI100 HPC Accelerator for Scientific Research - 11/16/2020 04:41 PM
AMD today announced the new AMD Instinct MI100 accelerator - the world's fastest HPC GPU and the first x86 server GPU to surpass the 10 teraflops (FP64) performance barrier....
Researchers manage to decrypt Intel's secret CPU code key - 10/29/2020 08:58 AM
Researchers Maxim Gorachy, Dmitry Skkylarov and Mark Ermolov have made done something what seemed impossible, they have succeeded in decrypting Intels secret key for CPUs for the first time, allowing ...
Intel Showcases Intelligent Edge and Energy-efficient Performance Research - 06/16/2020 08:22 AM
This week at the 2020 Symposia on VLSI Technology and Circuits, Intel will present a body of research and technical perspectives on the computing transformation driven by data that is increasingly dis...
AMD COVID-19 HPC Fund Donates 7 Petaflops of Compute Power to Researchers - 06/02/2020 10:01 AM
AMD and technology partner Penguin Computing Inc., a division of SMART Global Holdings, Inc, today announced that New York University (NYU), Massachusetts Institute of Technology (MIT) and Rice Univer...
Senior Member
Posts: 6493
Joined: 2012-11-10
For something like BT, it really ought to stay that way. I always saw BT as more of a convenience than a necessity, and I don't think it was smart for anyone to ever really trust its security. That's not to say BT devices should be insecure, but rather, you shouldn't be doing anything particularly sensitive over BT unless there is another layer of encryption involved. If all you're using BT for is printing your homework, connecting a gamepad, or listening to music, hackers aren't going to be interested. BT is short-range enough that you're not going to get people pranking you either.
Senior Member
Posts: 2410
Joined: 2016-08-01
man i use my computer nowadays with some nice taotronics bt headphones ..... i can not go back to using cabled headphones only that i stand from my computer changing room to make coffee etc and they just keep playing is too convenient ! and their battery last 20 ++ hours pretty much i charge it once every 3 days .... and they never run out of juice on me !
Senior Member
Posts: 1819
Joined: 2012-04-30
@schmidtbag
yeah, no one uses BT except on their mouse, right?!
heard about bt enabled door locks/controllers/etc?
its more than 10 issues, most likely including something a little more risky than someone picking up you headphone connection.
Senior Member
Posts: 6493
Joined: 2012-11-10
@schmidtbag
yeah, no one uses BT except on their mouse, right?!
heard about bt enabled door locks/controllers/etc?
I have heard about them and they're a terrible idea. They're notoriously insecure.
I stand by my original statement: if you care about security, you don't use BT.
Posts: 6751
Joined: 2008-03-06
Bluetooth version numbers ranged from 3.0 to 5.2, with 3.0 being the most recent.
This line doesn't make sense.
The most recent is 5.2 would be correct.
Bluetooth firmware are almost never updated on devices, users take those as secure for granted. And you are stuck with whatever you bought.
Convenience trumps security, it's a given.