Are Bluetooth connections secure?

Flaws in Bluetooth connections have been exploited in the past to compromise the security of users. Now, however, architectural problems in the technology are highlighting the risks posed by the use Bluetooth devices for communication

December 04, 2023 12:52 pm | Updated 01:46 pm IST

Researchers at Eurecom discovered two previously unknown flaws in the Bluetooth standard that are not specific to hardware or software configuration.

Researchers at Eurecom discovered two previously unknown flaws in the Bluetooth standard that are not specific to hardware or software configuration. | Photo Credit: AP

The use of Bluetooth connections to compromise the security of users is not a new problem. So far, vulnerabilities were thought to have existed due to lack of foresight on the manufacturer’s end.

However, recent research at Eurecom, a French Graduate School and digital research center, discovered two previously unknown flaws in the Bluetooth standard that are not specific to hardware or software configuration but are architectural. These affect Bluetooth on a fundamental level and impact billions of devices including laptops, smartphones, and other mobile devices. The flaws were found to impact not just older versions, even versions released as far as February 2023.

Using the previously unknown flaws researchers developed six new attacks collectively dubbed “BLUFFS” that can break the secrecy of Bluetooth sessions allowing attackers to impersonate devices and perform man-in-the-middle (MitM) attacks.

A man-in-the-middle or MitM attack is a cyber-attack where attackers intercept communication between devices. Attackers use this method for not just snooping on a private conversation between devices, but also to perform unauthorised purchases and hacking into devices.

(For top technology news of the day, subscribe to our tech newsletter Today’s Cache)

The exploits targeting Bluetooth connections break Bluetooth sessions’ forward and future secrecy. This is achieved by exploiting flaws in the session’s key derivation process that allow attackers to brute-force the key. This allows them to decrypt past communication and decrypt or manipulate future communications.

Also Read | OpenAI’s identity service provider Okta hit by cyber attack

This form of attack impacts devices including smartphones, earphones, and laptops running different versions of Bluetooth, all of which were confirmed to be susceptible to at least three out of the six attacks.

Remedies for flaws in Bluetooth technology

Researchers suggested modifications in the use of Bluetooth technology to remedy the flaws. These include introducing a new “Key Derivation Function”. Introduction of pairing keys for devices for mutual authentication to ensure attackers cannot use man-in-the-middle attacks to compromise security. Enforcing secure connections wherever possible and maintaining a cache of session keys to prevent reuse.

Bluetooth SIG (Special Interest Group), a non-profit organization overseeing the development of the Bluetooth standard in response to the report suggested changes in how the technology is operated. These include the rejection of low key strengths and ensure higher encryption strengths along with the use of “Secure Connections Only” mode when pairing devices.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.