Major Bluetooth security flaw leaves millions of devices at risk

(Image credit: Shutterstock)

A significant security vulnerability in Bluetooth has left millions of smartphones and other devices at risk of attack, researchers have said.

The flaw would allow an attacker to more easily brute force the encryption key used by devices during pairing to monitor or even manipulate the data transferred between two paired devices.

The vulnerability has been given the name “Key Negotiation of Bluetooth attack” or “KNOB” for short and it affects Bluetooth BR/EDR devices using specification versions 1.0 to 5.1.

News of the KNOB vulnerability was revealed in a coordinated disclosure between the Center for IT-Security, Privacy and Accountability (CISPA), ICASI and ICASI members including Microsoft, Apple, Intel, Cisco and Amazon.

The flaw itself allows an attacker to reduce the length of the encryption key used for establishing a connection and in some cases, the length of the encryption key could be reduced to just a single octet making Bluetooth devices much easier to access.

KNOB vulnerability

A security advisory on Bluetooth.com, provided further insight on how the KNOB vulnerability functions, saying:

"The researchers identified that it is possible for an attacking device to interfere with the procedure used to set up encryption on a BR/EDR connection between two devices in such a way as to reduce the length of the encryption key used. In addition, since not all Bluetooth specifications mandate a minimum encryption key length, it is possible that some vendors may have developed Bluetooth products where the length of the encryption key used on a BR/EDR connection could be set by an attacking device down to a single octet." 

After figuring out the Bluetooth keys of two devices, attackers could then monitor and manipulate the data being sent between them. This would even allow them to inject commands, monitor key strokes and carry out other types of malicious behavior. Fortunately, ICASI has not yet seen this attack method used maliciously nor have any devices been created to initiate this type of attack.

Exploiting the KNOB vulnerability would also be difficult because both devices need to be Bluetooth BR/EDR, the attacker would need to be within range of the devices while they establish a connection and the attack would also need to be repeated every time the devices paired. The Bluetooth specification has also been updated to recommend a minimum encryption key length of seven octets for BR/EDR connections to resolve this vulnerability.

Via Bleeping Computer

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Security
Polish space agency says it was hit by a cyberattack
Microsoft
Microsoft names cybercriminals who created explicit deepfakes
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
More reports claim 2024 was the worst year for ransomware attacks yet
Representational image of a cybercriminal
Microsoft discovers five potentially damaging attacks against its own software
Avast cybersecurity
Zapier tells customers their data may have been accessed
Shadowed hands on a digital background reaching for a login prompt.
Private API keys and passwords found in AI training dataset - nearly 12,000 details leaked
Latest in News
Polish space agency says it was hit by a cyberattack
The new limited edition Ray-Ban Meta smart glasses show a translucent design.
Ray-Ban and Meta just teased new limited-edition smart glasses – but they'll be in frustratingly short supply
A MacBook Air on the left, showing the macOS lock screen, and the iPad Air in two sizes on the left, showing an abstract wallpaper
New MacBook Air launch expected imminently – all the latest news and rumors live
PCI Express bus interface connector, x16, x8, x4, x1, on the computer motherboard
AMD warns its RX 9070 GPUs are strictly ‘UEFI-only’ – and if that sounds worrying, don’t panic, it probably doesn’t affect you
OnePlus Watch 3
The OnePlus Watch 2 won't get Wear OS 5 until Q3 of this year, and the news for the OnePlus Watch 3 is even worse
Google Pixel 8a in aloe green showing
New Google Pixel 9a leaks tease color options, and satellite connectivity to take on the iPhone 16e