back to article Big bad Bluetooth blunder bug battered – check for security fixes

With a bunch of security fixes released and more on the way, details have been made public of a Bluetooth bug that potentially allows miscreants to commandeer nearby devices. This Carnegie-Mellon CERT vulnerability advisory on Monday laid out the cryptographic flaw: firmware or operating system drivers skip a vital check …

  1. Dagg Silver badge

    So who pays for the fix?

    Especially when you own a car like a ford that once sold new they disown the sat nav and av system. So if there are any blue tooth security bugs in car subsystem you are stuffed.

    Just like the ford gear boxes. They will just blame the driver.

    1. herman
      WTF?

      Re: So who pays for the fix?

      This bug has been there since before the dinosaurs and nobody found it?

      1. Dan 55 Silver badge

        Re: So who pays for the fix?

        No, Bluetooth LE is a whole new protocol, where they made the same mistakes as they did in classic Bluetooth years ago, all over again.

      2. GnuTzu
        FAIL

        Re: So who pays for the fix?

        "...since before the dinosaurs and nobody found it?"

        Too complicated and convoluted is this standard. It's almost as if it was designed to obfuscate bugs and vulns.

  2. Pascal Monett Silver badge

    "within radio range and transmitting while the gadgets were pairing"

    Okay, I don't like the idea that the protocol is stuffed, but frankly I don't see how someone could take advantage of it for long. When I start my car and my phone pairs with it, I'm not staying there, so the miscreant would have to follow me and stay in range.

    I'm putting this in the forget it folder.

    1. 78910

      Re: "within radio range and transmitting while the gadgets were pairing"

      I'm not so worried about my fitness gadgets or navigation stuff either.

      But this sounds like it could affect bluetooth keyboards - them things that people use to type passwords with.

    2. Toby Nixon

      Re: "within radio range and transmitting while the gadgets were pairing"

      The vulnerability exists only during the initial, first-time pairing of your phone with your car. Once it is paired, then the vulnerability does not exist each time you get in your car.

      1. YetAnotherLocksmith Silver badge

        Re: "within radio range and transmitting while the gadgets were pairing"

        That's going to depend how badly designed your car pairing system is, tbh.

        Some of them scan and try to pair anything when you turn on the ignition, "for convenience".

        Of course, the real danger is that someone could just pair with your vehicle/device!

        Still, this sounds about as easy as a MITM attack, except you have a different weird parameter - you have to be there at pairing time, rather than somehow closer than the pairing devices.

  3. J4

    Is it initial pairing, or every session ?

    Layman here, and not clear to me; I understood 'pairing' to be the initial intro of two devices to each other for the first time. Is that the only window of vulnerability, or is it every time two devices re-connect when they already know about each other ?

    1. Toby Nixon

      Re: Is it initial pairing, or every session ?

      The vulnerability only exists during initial pairing. The attacker needs to be present AND able to prevent the host and device from receiving from each other during the key exchange while it acts as a man-in-the-middle. There is no known implementation of the attack that has been shown to work in real life.

      1. diodesign (Written by Reg staff) Silver badge

        Re: Re: Is it initial pairing, or every session ?

        FWIW we wrote about this because it's an interesting crypto bug (which will need patching eventually to be on the safe side) rather than a terrifying end-of-days hack.

        C.

  4. David Roberts

    Not a major BlueTooth user

    However the devices I have don't seem to have any mechanism for firmware updates.

    One device was shipped with a bug in the firmware and the fix was to ship a replacement.

    Which raises the next question. I assume that if one side of the pairing has the bug then it can be exploited?

    However the risk of someone snooping on the audio streams going to my speakers doesn't initially fill me with major anxiety.

    Assuming again, if I used BT headphones for phone calls then there is potential to snoop. My BT headphones currently in the drawer don't as far as I know have any firmware update mechanism.

    So is this a bug that can be exploited by a laptop sitting on a table in a cafe?

    1. Toby Nixon

      Re: Not a major BlueTooth user

      BOTH the host and the device must not validate the elliptic curve parameters during pairing in order for the vulnerability to be present. If either one of them does the validation, then the attack is not possible. If you, for example, update your phone but not your car, or update your PC but not your mouse, the attack won't be possible.

      As for headphones, for an attack to be successful, both your headphones and your phone would need to have the vulnerability, the attacker would have to be present during the initial pairing of the phone and the headphones, and the attacker would have to someone block the phone and headphones from receiving from each other during the pairing process. No known real-world implementation of the attack exists -- it is only described in an academic paper. And after the initial pairing (like when you first get your headphones and introduce them to your phone), the attack is no longer possible because the phone and headphones will have already set up the secret key between them.

      As for setting up a laptop in a cafe, the key question is: how often do you take a brand new Bluetooth device out of the box and pair it with your phone or laptop in a public place? Not very often -- but that's the only time the vulnerability could be exploited, on initial pairing.

  5. Anonymous Coward
    Anonymous Coward

    Predicted many years ago.....

    Many years ago now, I went to a conference.

    The CISO of a very large regulated company was there giving a presentation.

    One of the things that stuck in my mind was the part of his presentation that dealt with Bluetooth.

    Effectively anyone senior with access to business-sensitive information at his organisation was "strongly cautioned" against using Bluetooth accessories on business communications.

    The CISO made a good case for the decision and cited a number of published vulnerabilities as well as some of their own internal research.

    And at the end of his presentation, he summed it up neatly in one phrase:

    "If you think about it, you are paying hardly anything for these cheap mass-produced accessories. That should start ringing alarm bells for a start in terms of what you can expect from security. Then you start considering the small package size, limited components, battery life etc. and I will let you come to your own conclusions".

    1. YetAnotherLocksmith Silver badge

      Re: Predicted many years ago.....

      That really only relates to the update cycle though. If everyone is using the same formally correct secure implementation, then the risk is lower.

      However, when a bug is found, obviously the thing that cost 45p is less likely to have support. Sadly, that includes the Bluetooth chip in your car!

  6. jelabarre59

    Fortunately

    Fortunately I don't use Bluetooth for anything involving money transfer, etc. If someone wants to hop into my cellphone-headset connection, all they're going to get is a grocery shopping list from the spouse, or a chance to listen to some J-Pop. Maybe I could be using a BT keyboard tablet with a tablet, but I'm not doing banking there either (all the relevant info would be on my desktop machine at home, a web browser on a tablet sucks for those things, and I don't put "store apps" & the like on my tablet/phone).

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like