Security company Armis has found a collection of eight exploits, collectively called BlueBorne, that can allow an attacker access to your devices without physically accessing it. The attacker can take over Bluetooth enabled devices like smartphone, laptop, smart TV or IoT devices.
Armis has discovered total 8 zero-day vulnerabilities in Bluetooth protocol and in which 4 are marked as critical vulnerabilities. BlueBorne impact more than 8.2 billion devices today – from Android, iOS, Windows, Linux to IoT(Internet of things) devices.
The BlueBorne attack vector can be used to conduct remote code execution to Man-in-the-Middle attack to gain access to devices, data and networks without any physical interaction.
BlueBorne Attack Vector Explained
The attacker first locates active Bluetooth connections around him or her. Next, the attacker obtain’s the MAC address of the discovered device, now an attacker can easily know which operating system is the victim is using and can exploit accordingly.
After exploiting the device an attacker can create Man-in-The-Middle attack and control the device’s communication or can take full control over the device.
BlueBorne can serve any malicious objectives such as data theft, ransomware and can even create botnets networks out of IoT devices like the Mirai Botnet or like WireX Botnet.
According to Armis,”The BlueBorne attack vector surpasses the capabilities of most attack vectors by penetrating secure “air-gapped” networks which are disconnected from any other network, including the internet”.
Here Is The Video Demonstration:
- (CVE-2017-0785) Information Leak Vulnerability in Android. Example of impacted devices Google Pixel, Samsung Galaxy, Samsung Galaxy Tab, LG Watch Sport and Pumpkin Car Audio System.
- Remote Code Execution Vulnerability (CVE-2017-0781) in Android’s Bluetooth Network Encapsulation Protocol (BNEP) service.
- Remote Code Execution Vulnerability (CVE-2017-0782) in Android BNEP’s Personal Area Networking (PAN) profile.
- The Bluetooth Pineapple in Android—Logical flaw (CVE-2017-0783).
- The Bluetooth Pineapple in Windows—Logical flaw (CVE-2017-8628).
- Linux kernel Remote Code Execution vulnerability (CVE-2017-1000251).
- Linux Bluetooth stack (BlueZ) information leak vulnerability (CVE-2017-1000250).
- Remote Code Execution vulnerability in Apple Low Energy Audio Protocol
Google and Microsoft have already made security patched available to the users. To check whether your Android device is vulnerable or not download the Armis BlueBorne Scanner App on Google Play. Android users need to wait for the security patch as it depends on your device manufacturers.
All iPhone, iPad and iPod touch devices with iOS 9.3.5 and lower, and AppleTV devices with version 7.2.2 and lower are affected by the remote code execution vulnerability(RCE), while the most recent version of Apple iOS is(iOS 10) safe.
Devices running on Linux are also vulnerable to the attack. BlueZ are affected by the information leak vulnerability (CVE-2017-1000250), 3.3-rc1 is affected by the (CVE-2017-1000251) remote code execution vulnerability.To be safe, we recommend disabling Bluetooth and minimize its use until a confirm patch is not issued by your manufacturers.
To be safe, we recommend disabling Bluetooth and minimize its use until a confirm patch is not issued by your manufacturers.
You can get more in-depth research on BlueBorne on Armis website.
Get more stuff like this
in your inbox
Subscribe Us And Get Latest Tech News, Hacking News, Science News, And Latest Gadgets News Directly Delivered To Your Inbox
Thank You For Subscribing. Verification Email Has Been Send To You. Please Verify !
Something Went Wrong.