蓝牙耳机劫持:你手机的钥匙 [视频]
Bluetooth Headphone Jacking: A Key to Your Phone [video]

原始链接: https://media.ccc.de/v/39c3-bluetooth-headphone-jacking-a-key-to-your-phone

## 蓝牙耳机安全漏洞:摘要 研究人员丹尼斯·海因泽和弗里德·施泰因梅茨揭示了 Airoha 制造的蓝牙芯片中的严重漏洞(CVE-2025-20700、-20701、-20702)。Airoha 是索尼、马歇尔、拜亚动力和 Jabra 等品牌的的主要供应商。这些漏洞可能导致受影响的耳机和耳塞*完全*被攻破。 核心问题在于 Airoha 自定义的“RACE”协议,它赋予攻击者完全控制权——包括对设备内存的读/写访问权限。这允许进行固件操作,并且至关重要的是,可以利用它来攻击*已配对的设备*,例如通过已建立的信任关系攻击智能手机。攻击者可能会窃取蓝牙链路密钥并冒充外围设备。 研究人员将发布工具,帮助用户识别受影响的设备,并鼓励进一步调查。他们还批评一些制造商在这些安全风险和可用更新方面的沟通不足。这项研究凸显了一种日益增长的趋势:随着智能手机变得越来越安全,蓝牙外围设备代表着越来越有吸引力的攻击途径。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 蓝牙耳机劫持:你手机的钥匙 [视频] (ccc.de) 7点 由 AndrewDucker 1小时前 | 隐藏 | 过去 | 收藏 | 讨论 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请YC | 联系 搜索:
相关文章

原文
Bluetooth Headphone Jacking: A Key to Your Phone - media.ccc.de

Dennis Heinze and Frieder Steinmetz

Playlists: '39c3' videos starting here / audio

Bluetooth headphones and earbuds are everywhere, and we were wondering what attackers could abuse them for. Sure, they can probably do things like finding out what the person is currently listening to. But what else? During our research we discovered three vulnerabilities (CVE-2025-20700, CVE-2025-20701, CVE-2025-20702) in popular Bluetooth audio chips developed by Airoha. These chips are used by many popular device manufacturers in numerous Bluetooth headphones and earbuds.

The identified vulnerabilities may allow a complete device compromise. We demonstrate the immediate impact using a pair of current-generation headphones. We also demonstrate how a compromised Bluetooth peripheral can be abused to attack paired devices, like smartphones, due to their trust relationship with the peripheral.

This presentation will give an overview over the vulnerabilities and a demonstration and discussion of their impact. We also generalize these findings and discuss the impact of compromised Bluetooth peripherals in general. At the end, we briefly discuss the difficulties in the disclosure and patching process. Along with the talk, we will release tooling for users to check whether their devices are affected and for other researchers to continue looking into Airoha-based devices.

Examples of affected vendors and devices are Sony (e.g., WH1000-XM5, WH1000-XM6, WF-1000XM5), Marshall (e.g. Major V, Minor IV), Beyerdynamic (e.g. AMIRON 300), or Jabra (e.g. Elite 8 Active).

Airoha is a vendor that, amongst other things, builds Bluetooth SoCs and offers reference designs and implementations incorporating these chips. They have become a large supplier in the Bluetooth audio space, especially in the area of True Wireless Stereo (TWS) earbuds. Several reputable headphone and earbud vendors have built products based on Airoha’s SoCs and reference implementations using Airoha’s Software Development Kit (SDK).

During our Bluetooth Auracast research we stumbled upon a pair of these headphones. During the process of obtaining the firmware for further research we initially discovered the powerful custom Bluetooth protocol called *RACE*. The protocol provides functionality to take full control of headphones. Data can be written to and read from the device's flash and RAM.

The goal of this presentation is twofold. Firstly, we want to inform about the vulnerabilities. It is important that headphone users are aware of the issues. In our opinion, some of the device manufacturers have done a bad job of informing their users about the potential threats and the available security updates. We also want to provide the technical details to understand the issues and enable other researchers to continue working with the platform. With the protocol it is possible to read and write firmware. This opens up the possibility to patch and potentially customize the firmware.

Secondly, we want to discuss the general implications of compromising Bluetooth peripherals. As smart phones are becoming increasingly secure, the focus for attackers might shift to other devices in the environment of the smart phone. For example, when the Bluetooth Link Key, that authenticates a Bluetooth connection between the smart phone and the peripheral is stolen, an attacker might be able to impersonate the peripheral and gain its capabilities.

Licensed to the public under http://creativecommons.org/licenses/by/4.0

Download

These files contain multiple languages.

This Talk was translated into multiple languages. The files available for download contain all languages as separate audio-tracks. Most desktop video players allow you to choose between them.

Please look for "audio tracks" in your desktop video player.

Tags

联系我们 contact @ memedata.com