Bluetooth advocacy group warns of critical encryption exploit

The vulnerability allows third-parties to overwrite the key used to establish a link between two devices

Certain configurations of Bluetooth 4.2 to 5.0 on dual-mode devices contain a flaw that could allow hackers to conduct 'man in the middle' (MITM) attacks or overwrite encryption keys.

Known as BLURtooth, the vulnerability assigned CVE-2020-15802 can be found on devices supporting both Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) transportation methods as well as Low Energy (LE) connections.

Although an alert, published by Carnegie Melon University, doesn't specify which particular devices are affected, a number of widely-available dual-mode devices fall into the bracket, including the Dynabook Portégé X30L-G business notebook, the Nokia 5.3 smartphone, and the Sonos Move wireless speaker system.

The flaw lies in the pairing mechanism in these dual-band Bluetooth devices, with the vulnerability allowing third-parties to overwrite the key used to establish a link between two devices. The vulnerability, and the group of viable attacks, categorised as BLUR, was first discovered by academics with École Polytechnique Fédérale de Lausanne (EPFL) and Purdue University.

“The researches identified that CTKD, when implemented to older versions of the specification, may permit escalation of access between the two transports with non-authenticated encryption keys replacing authenticated keys or weaker encryption keys replacing stronger encryption keys,” according to the Bluetooth Special Interest Group (SIG).

BLURtooth mainly affects devices that use the Cross-Transport Key Derivation (CRKD) mechanism for Bluetooth pairing. The fault may allow an attacker to reduce the strength of the encryption key, or overwrite an authenticated key with an unauthenticated key in order to gain access to profiles or services.

To conduct successful attacks, a hacker must be within wireless range of a vulnerable Bluetooth device that supports CTKD connections and supports pairing either with no authentication or no access restrictions on pairing.

An attacker spoofing another device’s identity may bond with the vulnerable device and derive a key through the CTKD mechanism that overwrites a pre-existing encryption key of much greater strength. In doing so, the attacker can access authenticated services, or conduct a MITM attack in future between devices that were previously bonded.

BLURtooth is the latest serious Bluetooth vulnerability to be recognised by the Bluetooth SIG in recent months after the organisation was forced to update the core specification following the discovery of BIAS in May 2020.

Also centred on devices using BR/EDR, the Bluetooth Impersonation Attacks (BIAS) flaw allowed attackers to break security mechanisms and impersonate one device in a pair after a bond has been established.

Related Resource

The State of Email Security 2020

Email security insights at your email perimeter, inside your organisation, and beyond

Email security insights at your email perimeter, inside your organisation, and beyondDownload now

BIAS can also work in conjunction with other attacks, such as the Key Negotiation of Bluetooth (KNOB) attack, which allowed hackers to brute force watered-down encryption keys and intercept data transmitted between devices.

Bluetooth SIG has recommended that potentially vulnerable devices should be updated with the restrictions placed on CTKD, as mandated by the Bluetooth Core Specification version 5.1 and beyond.

The details of the vulnerability are also being relayed to members of the organisation, which includes hundreds of device manufacturers, with these members encouraged to rapidly integrate any patches as and when they become available.

Featured Resources

The definitive guide to warehouse efficiency

Get your free guide to creating efficiencies in the warehouse

Free download

The total economic impact™ of Datto

Cost savings and business benefits of using Datto Integrated Solutions

Download now

Three-step guide to modern customer experience

Support the critical role CX plays in your business

Free download

Ransomware report

The global state of the channel

Download now

Recommended

Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
The technology powering the future of shopping
Technology

The technology powering the future of shopping

16 Sep 2021