BLUFFS- New Bluetooth Attacks Open Path to Device Impersonation

by | Nov 29, 2023 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Eurecom researchers have uncovered a series of six new Bluetooth attacks collectively named ‘BLUFFS.’ These exploits capitalize on two previously unknown flaws in the Bluetooth standard, affecting the derivation of session keys and compromising forward and future secrecy in Bluetooth sessions.

Daniele Antonioli, the mind behind these attacks, emphasizes that BLUFFS targets architectural flaws rather than specific hardware or software configurations. This means that the vulnerabilities strike at the core of Bluetooth technology, impacting versions 4.2 through 5.4 of the Bluetooth Core Specification.

SALE: Benefit from discounted prices on our Courses from 24/11 to 06/12.
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

BLUFFS in Action

BLUFFS works by exploiting four flaws in the session key derivation process, leading to the generation of a weak and predictable session key. This allows attackers within Bluetooth range to impersonate devices, negotiate weak session keys, and compromise the confidentiality of past and future communications between devices.

Attack stepsAttack steps (dl.acm.org)

The attacks assume proximity to the targets exchanging data and involve impersonation to force weak session key derivation.

Negotiating a session key while spoofing a legitimate partyNegotiating a session key while spoofing a legitimate party
(dl.acm.org)

The researchers have shared a toolkit on GitHub demonstrating the effectiveness of BLUFFS, including Python scripts, ARM patches, parsers, and captured PCAP samples.

Impact and Mitigations

The impact of BLUFFS extends across billions of devices, including smartphones, laptops, and other Bluetooth-enabled devices. The vulnerabilities affect Bluetooth versions from 4.2 to the latest 5.4.




BLUFFS tested against a gamut of devicesBLUFFS tested against a gamut of devices (dl.acm.org)

Eurecom’s proposed solutions involve introducing a new “Key Derivation Function” for Legacy Secure Connections, enforcing Secure Connections mode, and maintaining a cache of session key diversifiers to prevent reuse.

The Bluetooth SIG, overseeing Bluetooth standard development, has received Eurecom’s report and has recommended implementing stronger security measures, rejecting low-strength key connections, and promoting the use of ‘Secure Connections Only’ mode during pairing.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This