A number of vulnerabilities in Airoha Bluetooth chips may very well be exploited to take over headphone and earbud merchandise from a number of distributors, IT safety agency ERNW warns.
Airoha gives Bluetooth system on a chip (SoC) merchandise and reference designs and implementations for them, and has change into one of many largest suppliers for headphone and earbud distributors, together with Beyerdynamic, Marshall, and Sony.
In accordance with ERNW, merchandise constructed utilizing Airoha’s SoCs, in addition to reference implementations that depend on its software program growth package (SDK) expose a customized protocol that permits attackers to learn and write the RAM and flash storage, and manipulate the gadget.
The protocol is uncovered through Bluetooth Low Vitality Generic ATTribute Profile (BLE GATT), which covers knowledge switch over BLE, and because the RFCOMM channel through Bluetooth BD/EDR (the digital serial port connection in Bluetooth Traditional).
Not solely does the customized protocol expose vital capabilities, however lacking authentication for each GATT providers and Bluetooth BR/EDR opens the door to assaults, ERNW says.
“Lacking authentication for Bluetooth Traditional permits an attacker to make use of this protocol with out pairing with the gadget,” the corporate notes.
The vulnerabilities may be triggered each over BLE and Bluetooth BR/EDR, permitting attackers to take over units with out authentication or pairing. The assault is feasible in most situations, however requires the weak gadget to be in Bluetooth vary.
“It’s attainable to learn and write the gadget’s RAM and flash. These capabilities additionally permit attackers to hijack established belief relationships with different units, such because the cellphone paired to the headphones,” ERNW explains.Commercial. Scroll to proceed studying.
The safety defects open the door to assault situations that embrace studying out the enjoying media from the headphones, eavesdropping, extracting the gadget’s cellphone quantity and the cellphone numbers of incoming calls, or rewriting the gadget firmware to realize code execution, which results in a wormable exploit.
ERNW underlines that, in principle, any weak gadget is uncovered to most of these assaults, so long as the attacker is inside Bluetooth connectivity vary and has excessive technical abilities, as they would want to carry out a number of exploit steps with out being seen.
“Sure — the concept somebody might hijack your headphones, impersonate them in the direction of your cellphone, and probably make calls or spy on you, sounds fairly alarming,” the corporate says.
It additionally explains that such assaults are prone to be carried out towards high-value targets, resembling diplomats, journalists, VIPs beneath surveillance, people related to delicate industries, and political dissidents.
Airoha, ERNW says, has addressed the vulnerabilities within the newest model of its SDK, which was equipped to its clients. To this point, the safety agency just isn’t conscious of any vendor releasing firmware updates to handle the bugs.
Associated: Android, Linux, Apple Gadgets Uncovered to Bluetooth Keystroke Injection Assaults
Associated: New BLUFFS Bluetooth Assault Strategies Can Have Massive-Scale Affect: Researcher
Associated: Researchers Devise New Sort of Bluetooth LE Relay Assaults