Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds

Bluetooth Vulnerabilities Let Hackers Spy on Your Headphones and Earbuds

Posted on June 30, 2025June 30, 2025 By CWS

A significant safety flaw affecting thousands and thousands of Bluetooth headphones and earbuds has been found, permitting attackers to remotely hijack units and spy on customers with out requiring any authentication or pairing. 

Abstract
1. Vital flaws have an effect on thousands and thousands of Bluetooth headphones from Sony, Marshall, Bose utilizing Airoha chips – attackers solely want 10-meter proximity.
2. No pairing required – hackers exploit BLE GATT and RFCOMM protocols to regulate system reminiscence utterly.
3. Microphone eavesdropping, contact/name theft, unauthorized calls, potential malware unfold between units.
4. Fixes obtainable to producers since June 2025, however no public firmware updates launched but.

The vulnerabilities, recognized by cybersecurity researchers at ERNW, have an effect on units utilizing Airoha Techniques on a Chip (SoCs) and affect standard manufacturers together with Sony, Marshall, Beyerdynamic, and Bose.

Vital Flaws Allow Full System Takeover

The safety advisory reveals three vital vulnerabilities reminiscent of:

CVE-2025-20700 (Lacking Authentication for GATT Companies)

CVE-2025-20701 (Lacking Authentication for Bluetooth BR/EDR)

CVE-2025-20702 (Vital Capabilities of a Customized Protocol)

These flaws expose a strong customized protocol via BLE GATT (Bluetooth Low Power Generic Attribute Profile) and RFCOMM channels by way of Bluetooth Basic, permitting attackers to learn and write system RAM and flash reminiscence with none authentication.

The vulnerabilities have an effect on each Bluetooth BR/EDR (Bluetooth Basic) and Bluetooth Low Power (BLE) connections, requiring solely that attackers be inside Bluetooth vary of roughly 10 meters. 

CVEsDescriptionImpactCVSS ScoreCVE-2025-20700Missing Authentication for GATT ServicesRead/write system reminiscence, entry delicate knowledge 8.8 (Excessive)CVE-2025-20701Missing Authentication for Bluetooth BR/EDRComplete system takeover8.8 (Excessive)CVE-2025-20702Critical Capabilities of a Customized ProtocolFull RAM and flash reminiscence entry, Bluetooth hyperlink key extraction, system impersonation9.6 (Vital)

As soon as exploited, hackers can execute refined assaults, together with studying at present taking part in media from system RAM, establishing unauthorized HFP (Palms-Free Profile) connections to eavesdrop via microphones, and extracting Bluetooth hyperlink keys from flash reminiscence to impersonate trusted units

Media Information Exploit

Main Manufacturers and Fashions Affected

The analysis confirms vulnerabilities throughout a variety of shopper audio units, from entry-level to flagship fashions. 

Affected units embody a number of Sony fashions such because the WH-1000XM4, WH-1000XM5, WF-1000XM5, and WF-C500. Marshall’s whole product line seems compromised, together with the ACTON III, MAJOR V, MINOR IV, and STANMORE III audio system. 

Different confirmed weak units embody the Beyerdynamic Amiron 300, Bose QuietComfort Earbuds, Jabra Elite 8 Energetic, and numerous JBL fashions.

The scope extends past shopper headphones to incorporate wi-fi audio system, dongles, {and professional} audio gear. 

Many producers stay unaware that their units use weak Airoha SoCs, as Bluetooth modules are sometimes outsourced throughout improvement.

Airoha launched SDK updates with safety mitigations to system producers in early June 2025, however no firmware updates have been publicly launched but. 

The corporate’s response got here after a 90-day disclosure interval, throughout which researchers tried a number of contact strategies earlier than receiving acknowledgment. 

The vulnerabilities create a “wormable” exploit situation the place compromised units may probably unfold malware to different weak units via their GATT providers and traits.

Whereas the technical boundaries for exploitation stay excessive, requiring proximity and superior technical expertise, the vulnerabilities pose important dangers for high-value targets, together with journalists, diplomats, and VIPs. 

Customers are suggested to watch their system producers’ web sites for firmware updates and contemplate eradicating Bluetooth pairings in the event that they consider their system could also be focused.

Examine dwell malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Attempt ANY.RUN now 

Cyber Security News Tags:Bluetooth, Earbuds, Hackers, Headphones, Spy, Vulnerabilities

Post navigation

Previous Post: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more
Next Post: DragonForce Ransomware Empowers Affiliates with Modular Toolkit to Create Custom Ransomware Payloads

Related Posts

Critical Zero-Day Flaws in PDF Software Risk Data Exposure Critical Zero-Day Flaws in PDF Software Risk Data Exposure Cyber Security News
Securing Legacy Systems Strategies for Modernizing Old Tech Securing Legacy Systems Strategies for Modernizing Old Tech Cyber Security News
Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Threat Actors Leveraging GenAI for Phishing Attacks Impersonating Government Websites Cyber Security News
Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF Cyber Security News
10 Best Enterprise Remote Access Software 10 Best Enterprise Remote Access Software Cyber Security News
Apache bRPC Vulnerability Enables Remote Command Injection Apache bRPC Vulnerability Enables Remote Command Injection Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark