Skip to main content

Serious Bluetooth security flaw officially acknowledged; now patched by Apple

A serious Bluetooth security flaw has been acknowledged by Bluetooth SIG, the official body in charge of standards for the wireless communications technology. It is sufficiently dangerous that the official Bluetooth specification has been changed.

The vulnerability would make it far easier for an attacker to brute-force a pairing with your devices…

Bluetooth operates on the basis that both devices have to agree to the connection. One sends a request, and the other must accept it. An exchange of public keys verifies the identities of the devices, and encryption keys are generated for the connection, ensuring that it is secure.

The Bluetooth security flaw means that an attacker could interfere with the encryption setup, forcing a much shorter encryption key — right down to a single octet, equivalent to a single character. That then makes it easy to try all possible encryption keys to establish the connection, as Bluetooth SIG explains in the security notice.

The researchers identified that it is possible for an attacking device to interfere with the procedure used to set up encryption on a BR/EDR connection between two devices in such a way as to reduce the length of the encryption key used.

In addition, since not all Bluetooth specifications mandate a minimum encryption key length, it is possible that some vendors may have developed Bluetooth products where the length of the encryption key used on a BR/EDR connection could be set by an attacking device down to a single octet.

In addition, the researchers identified that, even in cases where a Bluetooth specification did mandate a minimum key length, Bluetooth products exist in the field that may not currently perform the required step to verify the negotiated encryption key meets the minimum length. In such cases where an attacking device was successful in setting the encryption key to a shorter length, the attacking device could then initiate a brute force attack and have a higher probability of successfully cracking the key and then be able to monitor or manipulate traffic.

Companies have been asked to update their devices to ensure that encryption keys have a minimum of seven octets (equivalent to seven characters), and the Bluetooth spec has been changed to add this requirement. The narrow time window available for a spoofed connection means that this should be sufficient to guard against such attacks.

Apple has implemented this in the latest updates to its devices, so ensuring you are on the latest public version will render you safe from this form of attack.

It follows the revelation of another Bluetooth security flaw in June that potentially allows devices to be tracked.

FTC: We use income earning auto affiliate links. More.

OnlyBrush Smart Dental Travel Kit
You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

Check out 9to5Mac on YouTube for more Apple news:

Comments

Author

Avatar for Ben Lovejoy Ben Lovejoy

Ben Lovejoy is a British technology writer and EU Editor for 9to5Mac. He’s known for his op-eds and diary pieces, exploring his experience of Apple products over time, for a more rounded review. He also writes fiction, with two technothriller novels, a couple of SF shorts and a rom-com!


Ben Lovejoy's favorite gear