Bluetooth Impersonation AttackS (BIAS) Vulnerability

NJCCIC Advisory

Original Release Date: 5/26/2020

Summary

When two Bluetooth wireless devices pair or bond for the first time, a long-term key is generated for future sessions without having to repeat the same bonding process each time. Researchers, who discovered KNOB (Key Negotiation of Bluetooth) attacks in the summer of 2019, also discovered a vulnerability in the Bluetooth wireless protocol, dubbed BIAS (Bluetooth Impersonation AttackS ). The vulnerability is in the post-bonding authentication process that allows attackers to spoof the identity of a previously-bonded device and successfully authenticate and connect to another device without the long-term key. Successful exploitation could provide an attacker with access or control over a Bluetooth device, including many smartphones, tablets, laptops, and smart IoT devices from Apple, Broadcom, Cypress, Intel, Samsung, and others. At the time of this writing, Bluetooth SIG updated the Bluetooth Core Specification; however, the status and availability of vendor updates are unclear.

Recommendations

The NJCCIC recommends users check with their device manufacturer and ensure they have applied the most recent update to their devices after appropriate testing. Additional recommendations and technical information can be found in the Bluetooth SIG press release and the ZDNet article.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.