Adversaries could exploit freshly found security weaknesses in Bluetooth Main and Mesh Profile Technical specs to masquerade as legit gadgets and have out person-in-the-middle (MitM) attacks.
“Units supporting the Bluetooth Main and Mesh Requirements are susceptible to impersonation attacks and AuthValue disclosure that could enable an attacker to impersonate a legit product throughout pairing,” the Carnegie Mellon CERT Coordination Center reported in an advisory revealed Monday.
The two Bluetooth specs define the regular that enables for several-to-quite a few communication over Bluetooth to aid information transfer in between products in an ad-hoc network.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
The Bluetooth Impersonation AttackS, aka BIAS, empower a malicious actor to set up a secure relationship with a victim, without the need of acquiring to know and authenticate the long-time period vital shared between the victims, as a result efficiently bypassing Bluetooth’s authentication system.
“The BIAS attacks are the initial uncovering issues related to Bluetooth’s secure connection establishment authentication procedures, adversarial part switches, and Secure Connections downgrades,” the scientists mentioned. “The BIAS attacks are stealthy, as Bluetooth protected connection institution does not have to have user interaction.”
“To verify that the BIAS attacks are realistic, we efficiently conduct them versus 31 Bluetooth gadgets (28 distinctive Bluetooth chips) from significant hardware and program vendors, applying all the important Bluetooth variations, together with Apple, Qualcomm, Intel, Cypress, Broadcom, Samsung, and CSR.”
In addition, 4 separate flaws have been uncovered in Bluetooth Mesh Profile Specification versions 1. and 1..1. A summary of the flaws is as follows –
- CVE-2020-26555 – Impersonation in Bluetooth legacy BR/EDR pin-pairing protocol (Main Specification 1.0B via 5.2)
- CVE-2020-26558 – Impersonation in the Passkey entry protocol through Bluetooth LE and BR/EDR secure pairing (Main Specification 2.1 as a result of 5.2)
- N/A – Authentication of the Bluetooth LE legacy pairing protocol (Main Specification 4. by 5.2)
- CVE-2020-26556 – Malleable determination in Bluetooth Mesh Profile provisioning (Mesh profile 1. and 1..1)
- CVE-2020-26557 – Predictable AuthValue in Bluetooth Mesh Profile provisioning (Mesh profile 1. and 1..1)
- CVE-2020-26559 – Bluetooth Mesh Profile AuthValue leak (Mesh profile 1. and 1..1)
- CVE-2020-26560 – Impersonation attack in Bluetooth Mesh Profile provisioning (Mesh profile 1. and 1..1)
“Our attacks do the job even when the victims are applying Bluetooth’s strongest security modes, e.g., SSP and Protected Connections. Our attacks goal the standardized Bluetooth authentication treatment, and are as a result effective towards any standard compliant Bluetooth device,” the scientists reported.
The Android Open Resource Venture (AOSP), Cisco, Cradlepoint, Intel, Microchip Technology, and Red Hat are among the identified distributors with merchandise impacted by these security flaws. AOSP, Cisco, and Microchip Technology claimed they are at present doing work to mitigate the issues.
The Bluetooth Special Fascination Team (SIG), the corporation that oversees the progress of Bluetooth expectations, has also issued security notices for each of the 6 flaws. Bluetooth end users are recommended to install the most current proposed updates from system and running procedure brands as and when they are out there.
Uncovered this article exciting? Observe THN on Fb, Twitter and LinkedIn to browse additional exceptional material we post.
Some sections of this article are sourced from:
thehackernews.com