MobileNews

Serious Bluetooth security flaw officially acknowledged; now patched by Apple

A serious Bluetooth security flaw has been acknowledged by Bluetooth SIG, the official body in charge of standards for the wireless communications technology. It is sufficiently dangerous that the official Bluetooth specification has been changed.

The vulnerability would make it far easier for an attacker to brute-force a pairing with your devices…



Bluetooth operates on the basis that both devices have to agree to the connection. One sends a request, and the other must accept it. An exchange of public keys verifies the identities of the devices, and encryption keys are generated for the connection, ensuring that it is secure.

The Bluetooth security flaw means that an attacker could interfere with the encryption setup, forcing a much shorter encryption key — right down to a single octet, equivalent to a single character. That then makes it easy to try all possible encryption keys to establish the connection, as Bluetooth SIG explains in the security notice.

The researchers identified that it is possible for an attacking device to interfere with the procedure used to set up encryption on a BR/EDR connection between two devices in such a way as to reduce the length of the encryption key used.

In addition, since not all Bluetooth specifications mandate a minimum encryption key length, it is possible that some vendors may have developed Bluetooth products where the length of the encryption key used on a BR/EDR connection could be set by an attacking device down to a single octet.

In addition, the researchers identified that, even in cases where a Bluetooth specification did mandate a minimum key length, Bluetooth products exist in the field that may not currently perform the required step to verify the negotiated encryption key meets the minimum length. In such cases where an attacking device was successful in setting the encryption key to a shorter length, the attacking device could then initiate a brute force attack and have a higher probability of successfully cracking the key and then be able to monitor or manipulate traffic.

Companies have been asked to update their devices to ensure that encryption keys have a minimum of seven octets (equivalent to seven characters), and the Bluetooth spec has been changed to add this requirement. The narrow time window available for a spoofed connection means that this should be sufficient to guard against such attacks.

Apple has implemented this in the latest updates to its devices, so ensuring you are on the latest public version will render you safe from this form of attack.

It follows the revelation of another Bluetooth security flaw in June that potentially allows devices to be tracked.

Check out 9to5Mac on YouTube for more Apple news:

Check out the latest Apple iPhones at great prices from Gizmofashion – our recommended retail partner.


Author:
Source: 9TO5Google
Tags:


Related posts
GamingNews

Meta Shuts 3 VR Studios and Lays Off Hundreds of Devs as It Pivots From Virtual Reality and the Metaverse to AI

GamingNews

Streamer Tfue Hit With 30-Day Arc Raiders Ban Amid Cheater Purge, Then Immediately Unbanned

GamingNews

Bobby Kotick Claims Activision, Call of Duty, and Consoles Are Doing So Poorly It Proves He Was Right to Sell Activision Blizzard to Microsoft for $69 Billion

CryptoNews

Bitcoin Trades Elevated as CLARITY Act Nears, With Bulls Positioning for Fresh All-Time Highs

Sign up for our Newsletter and
stay informed!