Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Airoha Chip Vulnerabilities Expose Headphones to Takeover

Posted on June 30, 2025June 30, 2025 By CWS

A number of vulnerabilities in Airoha Bluetooth chips may very well be exploited to take over headphone and earbud merchandise from a number of distributors, IT safety agency ERNW warns.

Airoha gives Bluetooth system on a chip (SoC) merchandise and reference designs and implementations for them, and has change into one of many largest suppliers for headphone and earbud distributors, together with Beyerdynamic, Marshall, and Sony.

In accordance with ERNW, merchandise constructed utilizing Airoha’s SoCs, in addition to reference implementations that depend on its software program growth package (SDK) expose a customized protocol that permits attackers to learn and write the RAM and flash storage, and manipulate the gadget.

The protocol is uncovered through Bluetooth Low Vitality Generic ATTribute Profile (BLE GATT), which covers knowledge switch over BLE, and because the RFCOMM channel through Bluetooth BD/EDR (the digital serial port connection in Bluetooth Traditional).

Not solely does the customized protocol expose vital capabilities, however lacking authentication for each GATT providers and Bluetooth BR/EDR opens the door to assaults, ERNW says.

“Lacking authentication for Bluetooth Traditional permits an attacker to make use of this protocol with out pairing with the gadget,” the corporate notes.

The vulnerabilities may be triggered each over BLE and Bluetooth BR/EDR, permitting attackers to take over units with out authentication or pairing. The assault is feasible in most situations, however requires the weak gadget to be in Bluetooth vary.

“It’s attainable to learn and write the gadget’s RAM and flash. These capabilities additionally permit attackers to hijack established belief relationships with different units, such because the cellphone paired to the headphones,” ERNW explains.Commercial. Scroll to proceed studying.

The safety defects open the door to assault situations that embrace studying out the enjoying media from the headphones, eavesdropping, extracting the gadget’s cellphone quantity and the cellphone numbers of incoming calls, or rewriting the gadget firmware to realize code execution, which results in a wormable exploit.

ERNW underlines that, in principle, any weak gadget is uncovered to most of these assaults, so long as the attacker is inside Bluetooth connectivity vary and has excessive technical abilities, as they would want to carry out a number of exploit steps with out being seen.

“Sure — the concept somebody might hijack your headphones, impersonate them in the direction of your cellphone, and probably make calls or spy on you, sounds fairly alarming,” the corporate says.

It additionally explains that such assaults are prone to be carried out towards high-value targets, resembling diplomats, journalists, VIPs beneath surveillance, people related to delicate industries, and political dissidents.

Airoha, ERNW says, has addressed the vulnerabilities within the newest model of its SDK, which was equipped to its clients. To this point, the safety agency just isn’t conscious of any vendor releasing firmware updates to handle the bugs.

Associated: Android, Linux, Apple Gadgets Uncovered to Bluetooth Keystroke Injection Assaults

Associated: New BLUFFS Bluetooth Assault Strategies Can Have Massive-Scale Affect: Researcher

Associated: Researchers Devise New Sort of Bluetooth LE Relay Assaults

Security Week News Tags:Airoha, Chip, Expose, Headphones, Takeover, Vulnerabilities

Post navigation

Previous Post: A Pragmatic Approach To NHI Inventories 
Next Post: Casie Antalis Named Executive Director of CISA

Related Posts

OneDrive Gives Web Apps Full Read Access to All Files Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA Security Week News
Hacker Conversations: Rachel Tobac and the Art of Social Engineering Security Week News
Spyware Maker NSO Ordered to Pay $167 Million Over WhatsApp Hack Security Week News
New ‘SmartAttack’ Steals Air-Gapped Data Using Smartwatches Security Week News
Whole Foods Distributor United Natural Foods Hit by Cyberattack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Identify and Avoid Tech Support Scams
  • Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website
  • Citrix Warns Authentication Failures Following The Update of NetScaler to Fix Auth Vulnerability
  • Apache Tomcat and Camel Vulnerabilities Actively Exploited in The Wild
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News