Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Airoha Chip Vulnerabilities Expose Headphones to Takeover

Posted on June 30, 2025June 30, 2025 By CWS

A number of vulnerabilities in Airoha Bluetooth chips may very well be exploited to take over headphone and earbud merchandise from a number of distributors, IT safety agency ERNW warns.

Airoha gives Bluetooth system on a chip (SoC) merchandise and reference designs and implementations for them, and has change into one of many largest suppliers for headphone and earbud distributors, together with Beyerdynamic, Marshall, and Sony.

In accordance with ERNW, merchandise constructed utilizing Airoha’s SoCs, in addition to reference implementations that depend on its software program growth package (SDK) expose a customized protocol that permits attackers to learn and write the RAM and flash storage, and manipulate the gadget.

The protocol is uncovered through Bluetooth Low Vitality Generic ATTribute Profile (BLE GATT), which covers knowledge switch over BLE, and because the RFCOMM channel through Bluetooth BD/EDR (the digital serial port connection in Bluetooth Traditional).

Not solely does the customized protocol expose vital capabilities, however lacking authentication for each GATT providers and Bluetooth BR/EDR opens the door to assaults, ERNW says.

“Lacking authentication for Bluetooth Traditional permits an attacker to make use of this protocol with out pairing with the gadget,” the corporate notes.

The vulnerabilities may be triggered each over BLE and Bluetooth BR/EDR, permitting attackers to take over units with out authentication or pairing. The assault is feasible in most situations, however requires the weak gadget to be in Bluetooth vary.

“It’s attainable to learn and write the gadget’s RAM and flash. These capabilities additionally permit attackers to hijack established belief relationships with different units, such because the cellphone paired to the headphones,” ERNW explains.Commercial. Scroll to proceed studying.

The safety defects open the door to assault situations that embrace studying out the enjoying media from the headphones, eavesdropping, extracting the gadget’s cellphone quantity and the cellphone numbers of incoming calls, or rewriting the gadget firmware to realize code execution, which results in a wormable exploit.

ERNW underlines that, in principle, any weak gadget is uncovered to most of these assaults, so long as the attacker is inside Bluetooth connectivity vary and has excessive technical abilities, as they would want to carry out a number of exploit steps with out being seen.

“Sure — the concept somebody might hijack your headphones, impersonate them in the direction of your cellphone, and probably make calls or spy on you, sounds fairly alarming,” the corporate says.

It additionally explains that such assaults are prone to be carried out towards high-value targets, resembling diplomats, journalists, VIPs beneath surveillance, people related to delicate industries, and political dissidents.

Airoha, ERNW says, has addressed the vulnerabilities within the newest model of its SDK, which was equipped to its clients. To this point, the safety agency just isn’t conscious of any vendor releasing firmware updates to handle the bugs.

Associated: Android, Linux, Apple Gadgets Uncovered to Bluetooth Keystroke Injection Assaults

Associated: New BLUFFS Bluetooth Assault Strategies Can Have Massive-Scale Affect: Researcher

Associated: Researchers Devise New Sort of Bluetooth LE Relay Assaults

Security Week News Tags:Airoha, Chip, Expose, Headphones, Takeover, Vulnerabilities

Post navigation

Previous Post: A Pragmatic Approach To NHI Inventories 
Next Post: Casie Antalis Named Executive Director of CISA

Related Posts

DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities Security Week News
Vodafone Germany Fined $51 Million Over Privacy, Security Failures Security Week News
GreyNoise Flags 9,000 ASUS Routers Backdoored Via Patched Vulnerability Security Week News
743,000 Impacted by McLaren Health Care Data Breach Security Week News
Asus Armoury Crate Vulnerability Leads to Full System Compromise Security Week News
Securonix Acquires Threat Intelligence Firm ThreatQuotient Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News