Bluetooth devices could soon face a whole new level of security threats

Bluetooth
(Image credit: Pixabay)

Researchers have found a way to wiggle their way between two endpoints communicating via Bluetooth, giving them the opportunity to mount device impersonation or man-in-the-middle (MitM) attacks.

The technique was discovered by cybersecurity researchers at Eurecom, who found two flaws that can compromise the secrecy of a Bluetooth session, and six possible attack scenarios, which they dubbed “BLUFFS”.

The flaws are now tracked as CVE-2023-24023, and affect Bluetooth Core Specification from version 4.2 onward. They affect Bluetooth “at a fundamental level”, the publication explains.

Reader Offer: $50 Amazon gift card with demo

Reader Offer: $50 Amazon gift card with demo
Perimeter 81's Malware Protection intercepts threats at the delivery stage to prevent known malware, polymorphic attacks, zero-day exploits, and more. Let your people use the web freely without risking data and network security.

Preferred partner (What does this mean?

Billions of vulnerable devices

The vulnerabilities work because of the way Bluetooth derives session keys which decrypt data in exchange. By affecting the derivation process, the attackers can force Bluetooth to derive a short session key, which can subsequently be brute-forced. That allows the attackers to eavesdrop on any communication between the two endpoints.

The challenge here is that the attacker needs to be within Bluetooth range of the two targets in order to pull the attack off. That being said, there are six different attacks that can be mounted abusing the flaw, including different MitM attacks, the researchers said. They also developed a toolkit to demonstrate just how effective BLUFFS are, and shared it on GitHub. 

Finally, the researchers came up with a couple of modifications to the Bluetooth standard that would tackle BLUFFS and similar threats, and include enhancement to the session key derivation process. The modifications are backward-compatible, they added. The list of mitigations can be found here.

Bluetooth has been around for years and is considered a safe, well-established standard for wireless communication. Therefore, such a vulnerability could be abused to compromise billions of devices around the world, including laptops, smartphones, different internet-connected sensors, and more.

Eurecom tested the flaws on different endpoints and found that all of them were vulnerable to at least three out of six BLUFFS attacks.

Via BleepingComputer

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Bluetooth
Top Bluetooth chip security flaw could put a billion devices at risk worldwide
Find My app logo displayed on an iPhone 11 screen
This Find My exploit lets hackers track any Bluetooth device – here’s how you can stay safe
An abstract image of a lock against a digital background, denoting cybersecurity.
Apple CPU security issue could let hackers steal user data from browsers
A person at a laptop with a cybersecure lock symbol floating above it.
Parallels Desktop has some worrying security flaws for Mac users
Representational image depecting cybersecurity protection
OpenSSH vulnerabilities could pose huge threat to businesses everywhere
A VPN runs on a mobile phone placed on a laptop keyboard
SonicWall firewalls hit by worrying cyberattack
Latest in Security
Data leak
Top home hardware firm data leak could see millions of customers affected
Representational image depecting cybersecurity protection
Third-party security issues could be the biggest threat facing your business
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Broadcom warns of worrying security flaws affecting VMware tools
Android Logo
Devious new Android malware uses a Microsoft tool to avoid being spotted
URL phishing
HaveIBeenPwned owner suffers phishing attack that stole his Mailchimp mailing list
Ransomware
Cl0p resurgence drives ransomware attacks to new highs in 2025
Latest in News
Buzz Lightyear Space Ranger Spin Rennovations
Disney’s giving a classic Buzz Lightyear ride a tech overhaul – here's everything you need to know
Hisense U8 series TV on wall in living room
Hisense announces 2025 mini-LED TV lineup, with screen sizes up to 100 inches – and a surprising smart TV switch
Nintendo Music teaser art
Nintendo Music expands its library with songs from Kirby and the Forgotten Land and Tetris
Opera AI Tabs
Opera's new AI feature brings order to your browser tab chaos
An image of Pro-Ject's Flatten it closed and opened
Pro-Ject’s new vinyl flattener will fix any warped LPs you inadvertently buy on Record Store Day
The iPhone 16 Pro on a grey background
iPhone 17 Pro tipped to get 8K video recording – but I want these 3 video features instead