Bluetooth Auracast headphones and logo

Robert Triggs / Android Authority


  • A French analysis workforce with EURECOM has found a scary Bluetooth safety flaw.
  • Utilizing a brute-force assault, a man-in-the-middle (MitM) operator might spoof two linked gadgets utilizing Bluetooth 4.2 or newer.
  • The Bluetooth SIG has acknowledged the flaw and made strategies for OEMs to maintain shoppers protected.

With smartphones not often incorporating headphone jacks anymore, billions of customers have needed to depend on Bluetooth headsets for his or her audio wants. Traditionally, this has been safe. There’s an encrypted connection between your cellphone and your headset, for instance.

Nonetheless, a French workforce at EURECOM has discovered a big flaw within the safety between two gadgets linked by way of Bluetooth. As first noticed by Bleeping Computer, the published paper on this exploit exhibits a comparatively easy technique for brute-force attacking the BT encryption keys between two gadgets. If profitable, the attacker might spoof the gadgets and entry probably delicate knowledge.

This exploit seems to work at the very least partially on any machine utilizing Bluetooth 4.2 or newer. For the file, Bluetooth 4.2 assist rolled out in late 2014, so most features of this assault would theoretically work on just about each trendy Bluetooth machine.

The workforce divided the assaults into six completely different kinds, with the acronym BLUFFS used to summarize all of them. As a part of the printed paper, the EURECOM workforce — led by Daniele Antonioli — confirmed a desk of the gadgets they had been in a position to spoof utilizing these assaults and the way profitable every of the six sorts was. The desk is…sobering, to say the least:

Bluetooth Security Exploit EURECOM

Fortunately, Antonioli and co. are being very open about their discoveries. The workforce has a GitHub page with loads of data for anybody who’s .

In the meantime, the Bluetooth Particular Curiosity Group (SIG), the non-profit company overseeing the usual’s growth, has acknowledged EURECOM’s findings. In a security bulletin, the Bluetooth SIG suggests OEMs instituting Bluetooth expertise in merchandise observe strict safety protocols to stop this assault from working. Nonetheless, it doesn’t point out if upcoming variations of Bluetooth will patch this exploit. The newest BT commonplace is v5.4, which was launched in February.