Flaws in how 17 models of headphones and speakers use Google’s one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.

List of vulnerable devices https://whisperpair.eu/vulnerable-devices

  • AernaLingus [any]@hexbear.net
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 month ago

    The flaw stems from many accessories failing to enforce a critical step in the pairing process. To start the Fast Pair procedure, a Seeker (a phone) sends a message to the Provider (an accessory) indicating that it wants to pair. The Fast Pair specification states that if the accessory is not in pairing mode, it should disregard such messages. However, many devices fail to enforce this check in practice, allowing unauthorised devices to start the pairing process. After receiving a reply from the vulnerable device, an attacker can finish the Fast Pair procedure by establishing a regular Bluetooth pairing.

    madeline-deadpan

  • Red5@lemmygrad.ml
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 month ago

    If you have to be within 50ft (15m) of the target to connect, you can probably see them already right?