Ticker

6/recent/ticker-posts

What is BlueBorne Bluetooth Attack?


 BlueBorne is a type of cyber attack that exploits a vulnerability in Bluetooth technology to target and compromise devices that have Bluetooth enabled. It was discovered by Armis, a cybersecurity research firm, in 2017.

BlueBorne is unique because it allows an attacker to spread malware or gain unauthorized access to devices without requiring any user interaction or authentication. In other words, an attacker can exploit the vulnerability in Bluetooth without the user clicking on any malicious links or downloading any files, making it a particularly dangerous attack vector.

The vulnerability lies in the implementation of Bluetooth in various operating systems, including Android, Windows, Linux, and iOS, and affects a wide range of devices, such as smartphones, tablets, laptops, smart TVs, IoT devices, and other connected devices.


Once a device is compromised through the BlueBorne attack, an attacker can potentially gain control of the device, steal sensitive data, conduct man-in-the-middle attacks, and spread malware to other nearby Bluetooth-enabled devices. The attack can be conducted remotely, without physical proximity to the target device, as Bluetooth signals can travel through the air and penetrate walls.

To mitigate the BlueBorne Bluetooth attack, it is essential to keep devices and operating systems up-to-date with the latest security patches and firmware updates. Disabling Bluetooth when not in use, avoiding pairing with unknown or untrusted devices, and being cautious with Bluetooth connections in public or crowded places can also help reduce the risk of falling victim to a BlueBorne attack. Additionally, using security solutions, such as firewalls and antivirus software, can add an extra layer of protection against Bluetooth vulnerabilities and other cyber threats.

How to know if your device is affected by BlueBorne or not?

According to Armis, all major computational platforms are affected by BlueBorne in some way or another. But some versions of some operating systems are slightly more vulnerable than this.

Windows:-

All Windows desktops, laptops and tablets running Windows Vista or earlier operating systems are affected by the “Bluetooth Pineapple” vulnerability and that can protect an attacker from Man-in-the-middle Attack (CVE-2017-8628) Huh.

Linux:-

Any device in which the operating system is based on the Linux kernel (Version 3.3-rc1 and newer), the attacker can remotely run the vulnerability code (CVE-2017-1000251). Additionally, all Linux devices running BlueZ are affected by the information leak vulnerability (CVE-2017-1000250). Additionally, there are other devices vulnerable to the BlueBorne attack such as smartwatches, TVs and kitchen appliances running the open source Tixon OS.

IOS:-

All iPhone, iPad and iPod touch devices running iOS 9.3.5 or earlier versions are also affected by this remote code execution vulnerability. Similarly, all Apple TV devices running TV OS version 7.2.2 or lower are expected to be affected. Also, it is heard that all devices running iOS 10 are expected to be protected with BlueBorne.

Android:-

Android is considered to be the most affected by BlueBorne as it is more popular and has more number of users. According to Armis, all Android versions are vulnerable to BlueBorne, and four different vulnerabilities have been found that primarily affect the Android OS.

There are two similar vulnerabilities performing remote code execution (CVE-2017-0781 and CVE-2017-0782), a similar result is information leak (CVE-2017-0785) and the last vulnerability is Man-in-the-middle Attack ( CVE-2017-0783).

Post a Comment

0 Comments