BIAS Bluetooth Vulnerability
Security researchers have released details of a vulnerability affecting the Bluetooth Classic core standard, including Basic Rate (BR) and Enhanced Data Rate (EDR) configurations. They claim that a user in communication range could perform what they call a Bluetooth Impersonation Attack (BIAS) to spoof previously paired devices, allowing them full access to the affected device.
Summary
Security researchers have released details of a vulnerability affecting the Bluetooth Classic core standard, including Basic Rate (BR) and Enhanced Data Rate (EDR) configurations. They claim that a user in communication range could perform what they call a Bluetooth Impersonation Attack (BIAS) to spoof previously paired devices, allowing them full access to the affected device.
Affected platforms
The following platforms are known to be affected:
Threat details
The vulnerability is a result of the Secure Simple Pairing (SSP) method used by Bluetooth not encrypting data during initial set-up of a connection and not authenticating previously legitimate connections. An attacker in wireless range could intercept this data during the initial connection and force the target device to downgrade its authentication link. They can then initiate a master-slave switch with the target device, effectively reversing the connection and causing the target device to attempt a connection to the attacker.
For further information:
Remediation steps
Last edited: 29 June 2021 12:01 pm