• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new bluetooth flaws let attackers impersonate legitimate devices

New Bluetooth Flaws Let Attackers Impersonate Legitimate Devices

You are here: Home / General Cyber Security News / New Bluetooth Flaws Let Attackers Impersonate Legitimate Devices
May 25, 2021

Adversaries could exploit freshly found security weaknesses in Bluetooth Main and Mesh Profile Technical specs to masquerade as legit gadgets and have out person-in-the-middle (MitM) attacks.

“Units supporting the Bluetooth Main and Mesh Requirements are susceptible to impersonation attacks and AuthValue disclosure that could enable an attacker to impersonate a legit product throughout pairing,” the Carnegie Mellon CERT Coordination Center reported in an advisory revealed Monday.

The two Bluetooth specs define the regular that enables for several-to-quite a few communication over Bluetooth to aid information transfer in between products in an ad-hoc network.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


password auditor

The Bluetooth Impersonation AttackS, aka BIAS, empower a malicious actor to set up a secure relationship with a victim, without the need of acquiring to know and authenticate the long-time period vital shared between the victims, as a result efficiently bypassing Bluetooth’s authentication system.

“The BIAS attacks are the initial uncovering issues related to Bluetooth’s secure connection establishment authentication procedures, adversarial part switches, and Secure Connections downgrades,” the scientists mentioned. “The BIAS attacks are stealthy, as Bluetooth protected connection institution does not have to have user interaction.”

“To verify that the BIAS attacks are realistic, we efficiently conduct them versus 31 Bluetooth gadgets (28 distinctive Bluetooth chips) from significant hardware and program vendors, applying all the important Bluetooth variations, together with Apple, Qualcomm, Intel, Cypress, Broadcom, Samsung, and CSR.”

In addition, 4 separate flaws have been uncovered in Bluetooth Mesh Profile Specification versions 1. and 1..1. A summary of the flaws is as follows –

  • CVE-2020-26555 – Impersonation in Bluetooth legacy BR/EDR pin-pairing protocol (Main Specification 1.0B via 5.2)
  • CVE-2020-26558 – Impersonation in the Passkey entry protocol through Bluetooth LE and BR/EDR secure pairing (Main Specification 2.1 as a result of 5.2)
  • N/A – Authentication of the Bluetooth LE legacy pairing protocol (Main Specification 4. by 5.2)
  • CVE-2020-26556 – Malleable determination in Bluetooth Mesh Profile provisioning (Mesh profile 1. and 1..1)
  • CVE-2020-26557 – Predictable AuthValue in Bluetooth Mesh Profile provisioning (Mesh profile 1. and 1..1)
  • CVE-2020-26559 – Bluetooth Mesh Profile AuthValue leak (Mesh profile 1. and 1..1)
  • CVE-2020-26560 – Impersonation attack in Bluetooth Mesh Profile provisioning (Mesh profile 1. and 1..1)

“Our attacks do the job even when the victims are applying Bluetooth’s strongest security modes, e.g., SSP and Protected Connections. Our attacks goal the standardized Bluetooth authentication treatment, and are as a result effective towards any standard compliant Bluetooth device,” the scientists reported.

The Android Open Resource Venture (AOSP), Cisco, Cradlepoint, Intel, Microchip Technology, and Red Hat are among the identified distributors with merchandise impacted by these security flaws. AOSP, Cisco, and Microchip Technology claimed they are at present doing work to mitigate the issues.

The Bluetooth Special Fascination Team (SIG), the corporation that oversees the progress of Bluetooth expectations, has also issued security notices for each of the 6 flaws. Bluetooth end users are recommended to install the most current proposed updates from system and running procedure brands as and when they are out there.

Uncovered this article exciting? Observe THN on Fb, Twitter  and LinkedIn to browse additional exceptional material we post.


Some sections of this article are sourced from:
thehackernews.com

Previous Post: «apple‌ issues patches to combat ongoing 0 day attacks on macos, Apple‌ Issues Patches to Combat Ongoing 0-Day Attacks on macOS, tvOS
Next Post: New High-Severity Vulnerability Reported in Pulse Connect Secure VPN new high severity vulnerability reported in pulse connect secure vpn»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.