Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol

Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol

Posted on January 20, 2026January 20, 2026 By CWS

WPair is an Android utility designed to establish and reveal the CVE-2025-36911 vulnerability affecting thousands and thousands of Bluetooth audio gadgets worldwide.

The software addresses a important authentication bypass flaw found by KU Leuven researchers in Google’s Quick Pair protocol, generally known as WhisperPair.​

CVE-2025-36911 represents a systemic failure in Quick Pair implementations throughout a number of producers and chipsets. The vulnerability stems from improper enforcement of pairing mode verification.

WPair Scanner for WhisperPair Flaw (supply: zalexdev GitHub)

In keeping with the WhisperPair analysis, many gadgets fail to ignore pairing requests from unauthorized sources when not explicitly in pairing mode.

Permitting attackers to forcibly set up connections inside seconds at ranges as much as 14 meters. The assault requires no consumer interplay or bodily gadget entry, making it notably harmful for client audio tools.​

WPair Performance

The appliance gives three core scanning and testing modes. The BLE Scanner discovers close by Quick Pair gadgets by figuring out gadgets that broadcast the 0xFE2C service UUID.

The Vulnerability Tester performs non-invasive checks to find out patch standing with out establishing connections.

For approved safety analysis, the Exploit characteristic demonstrates the whole assault chain, together with key-based pairing bypass, BR/EDR deal with extraction, and Bluetooth Traditional bonding.​

FeatureDescriptionBLE ScannerDetects Quick Pair gadgets in actual timeVulnerability TesterChecks CVE-2025-36911 patch standing safelyExploit DemoProof-of-concept for approved testingHFP Audio AccessShows microphone entry after exploitLive ListeningStreams audio to telephone instantlyAudio RecordingSaves captured audio for analysisDevice Standing DetectionFlags gadgets in pairing modeKey-Based mostly BypassDemonstrates Quick Pair auth bypassBR/EDR ExtractionRetrieves Bluetooth Traditional addressesClassic BondingCreates persistent audio connectionsAccount Key PersistenceDemonstrates long-term gadget monitoring

Publish-exploitation capabilities embrace accessing the Palms-Free Profile for microphone performance.

Customers can allow stay audio streaming on to their telephone speaker or save captured audio as M4A information for forensic evaluation.​

The vulnerability permits attackers to hijack gadgets with out authorization, enabling them to regulate audio playback, file conversations, and doubtlessly set up persistent monitoring by way of Google’s Discover Hub Community.

If a tool has by no means related to an Android gadget, attackers can add it to their very own account for location monitoring, exploiting the mechanism that designates the primary Account Key author because the gadget proprietor.​

WPair Work circulation (supply: zalexdev GitHub)

Affected producers embrace JBL, Harman Kardon, Sony, Marshall, and quite a few others, impacting an estimated a whole bunch of thousands and thousands of customers globally.

Technical Necessities and Set up Choices

CategoryDetailsMinimum Android VersionAndroid 8.0 (API 26) or higherBluetooth SupportBluetooth Low Vitality (BLE) requiredPermissionsLocation permissions (or Close by Units on Android 13+)Set up – APKDownload pre-compiled APK from ReleasesInstallation – Supply BuildBuild from supply utilizing Gradle

Google categorized this difficulty as important and awarded researchers the utmost $15,000 bounty. The 150-day disclosure window resulted in January 2026, and producers at the moment are releasing patches.

WPair explicitly excludes Discover Hub Community provisioning performance to take care of moral boundaries round stalkerware implementation.​

WPair requires Android 8.0 or larger with Bluetooth LE assist and applicable location permissions. The appliance is offered each as a precompiled APK and as a compiled supply through Gradle.

In keeping with the advisory, safety researchers ought to confirm they possess specific written authorization earlier than testing gadgets they don’t personal.

The software represents a big development in vulnerability evaluation for the IoT audio ecosystem, enabling producers and safety groups to establish affected gadgets requiring speedy firmware updates.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Detect, Fast, Flaw, Googles, Pair, Protocol, Scanner, Tool, WhisperPair

Post navigation

Previous Post: New Spear Phishing Attack Leveraging Argentine Federal Court Rulings to Covert RAT for Remote Access
Next Post: Hacker Pleads Guilty For Stealing Supreme Court Documents and Leaking via Instagram

Related Posts

Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware Operation Hanoi Thief Attacking IT Professionals with Pseudo-Polyglot Payload to Hide Malware Cyber Security News
Hackers Exploit NTLM Authentication Flaws to Target Windows Systems Hackers Exploit NTLM Authentication Flaws to Target Windows Systems Cyber Security News
Countering Spear Phishing with Advanced Email Security Solutions Countering Spear Phishing with Advanced Email Security Solutions Cyber Security News
Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Real-Time Threat Intelligence for Proactive Cyber Defense in 2025 Cyber Security News
WaterPlum’s New Malware Threatens VSCode Security WaterPlum’s New Malware Threatens VSCode Security Cyber Security News
New KimJongRAT Stealer Using Weaponized LNK File to Deploy Powershell Based Dropper New KimJongRAT Stealer Using Weaponized LNK File to Deploy Powershell Based Dropper Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Huskeys Secures $8 Million in Seed Funding for ESM Platform
  • Critical XSS Flaw in Jira Could Compromise Organizations
  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark