Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Wednesday May 20 2020, @03:11PM   Printer-friendly
from the a-notable-bias dept.

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices:

Academic researchers have uncovered security vulnerabilities in Bluetooth Classic that allows attackers to spoof paired devices: They found that the bugs allow an attacker to insert a rogue device into an established Bluetooth pairing, masquerading as a trusted endpoint. This allows attackers to capture sensitive data from the other device.

The bugs allow Bluetooth Impersonation Attacks (BIAS) on everything from internet of things (IoT) gadgets to phones to laptops, according to researchers at the École Polytechnique Fédérale de Lausanne (EPFL) in France. The flaws are not yet patched in the specification, though some affected vendors may have implemented workarounds.

"We conducted BIAS attacks on more than 28 unique Bluetooth chips (by attacking 30 different devices)," the researchers said. "At the time of writing, we were able to test chips from Cypress, Qualcomm, Apple, Intel, Samsung and CSR. All devices that we tested were vulnerable to the BIAS attack."

The issue lies in the pairing/bonding protocols used in the specification. When two Bluetooth devices are paired for the first time, they exchange a persistent encryption key (the "long-term key") that will then be stored, so that the endpoints are thereafter bonded and will connect to each other without having to perform the lengthier pairing process every time.

For the attacks to be successful, an attacking device would need to be within wireless range of a vulnerable Bluetooth device that has previously established bonding with a remote device with a Bluetooth address known to the attacker.

The post-pairing connections are enabled because the devices – let's call them Alice and Bob – perform a background check to make sure both possess the long-term key. This is done using the Legacy Secure Connections or Secure Connections protocols inside the Bluetooth specification, which verify three things: Alice's Bluetooth address, Bob's Bluetooth address and the shared long-term key.

As the researchers explained in their paper released on Monday, an attacker (let's call him Charlie) can change his Bluetooth address to mimic either Alice or Bob's address (uncovered via simple eavesdropping), but he cannot prove the ownership of [the long-term key]." The researchers explained, "this is the fundamental assumption behind Bluetooth's authentication guarantees, and this assumption should protect against impersonation attacks."

They added, "Both procedures authenticate [the long-term key] using a challenge-response protocol, and the procedure selection depends on Alice and Bob' supported features. The standard claims that both procedures protect secure connection establishment against impersonation attacks, as an attacker who does not know [the long-term key] cannot provide a correct response to a challenge."

However, several bugs exist in these processes, they found, opening the door for BIAS gambits while that post-pairing connection is being carried out. The problems include: The Bluetooth secure connection establishment is neither encrypted nor integrity-protected; Legacy Secure Connections secure connection establishment does not require mutual authentication; a Bluetooth device can perform a role switch anytime after baseband paging; and devices who paired using Secure Connections can use Legacy Secure Connections during secure connection establishment.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by janrinok on Wednesday May 20 2020, @06:28PM (2 children)

    by janrinok (52) Subscriber Badge on Wednesday May 20 2020, @06:28PM (#997035) Journal

    Indeed it is - and the source material actually says 'Switzerland' and not 'France'. I'm not sure how this got changed but I suggest that we leave Fnord666 and martyb in a room together to fight it out and decide who takes the blame!

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by captain normal on Wednesday May 20 2020, @08:53PM

    by captain normal (2205) on Wednesday May 20 2020, @08:53PM (#997092)

    They can blame it on the bot that submitted the story.

    --
    When life isn't going right, go left.
  • (Score: 2) by martyb on Wednesday May 20 2020, @09:28PM

    by martyb (76) Subscriber Badge on Wednesday May 20 2020, @09:28PM (#997102) Journal

    I have no recollection of changing that part of the story. As best as I can recall, I just split it from a single page in the "Intro Copy" section so that part of the story appeared in the "Extended Copy" section. IOW, so that it appears upon clicking "[Continues...]" or loading the entire article.

    Then again I was fast running out of steam at that point so I could have as easily edited in the mistake while half asleep.

    I'll remember this incident and try to pay closer attention the next time I 2nd a story.

    More importantly, the mistake was noticed, reported, and corrected — thanks for bringing it to our attention!

    --
    Wit is intellect, dancing.