#bluetoothhacking

2025-04-23

β€œIf governments are properly funded right now, there's a chance we'd actually see work crews going out there, going intersection to intersection. But since at the present moment in time, government departments are being slashed and burned, who knows?

"Then again, this is a stunt that's poking fun at the ruling class. So there's often been a way of magically making money appear out of nowhere, even while children go hungry in schools that are underfunded."
What could go wrong?πŸ˜‘

theregister.com/2025/04/19/us_
#crosswalkchaos
#bluetoothhacking

πŸ›‘ H3lium@infosec.exchange/:~# :blinking_cursor:​H3liumb0y@infosec.exchange
2023-12-07

"🧐 BLUFFS Attack - A Deeper Dive into the Threat Landscape πŸ•΅οΈβ€β™‚οΈπŸŒ"

The recent discovery of the BLUFFS vulnerability in Bluetooth BR/EDR devices, as detailed in CVE-2023-24023, poses a significant security risk. This vulnerability affects devices supporting Secure Connections pairing and Secure Simple Pairing in Bluetooth Core Specifications 4.2 through 5.4. It allows man-in-the-middle (MITM) attacks that can force a short key length, potentially leading to the discovery of the encryption key and enabling live injection attacks.

The ACM SIGSAC Conference paper titled "BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses" further explores this issue, presenting six novel attacks that break Bluetooth sessions' forward and future secrecy. These attacks exploit vulnerabilities in the Bluetooth standard related to unilateral and repeatable session key derivation.

The Bluetooth Special Interest Group (SIG) addresses has acknowledged the vulnerability and recommends that implementations reject service-level connections on an encrypted baseband link with key strengths below 7 octets. For enhanced security, using Security Mode 4 Level 4, which rejects connections below 16 octets, is advised. Additionally, tracking that a link key was established using BR/EDR Secure Connections and verifying subsequent encryption establishment is crucial to mitigate this risk. πŸ’‘πŸ”

πŸ”— MITRE ATT&CK Vectors - CVE-2023-24023

Tags: #CyberThreat #InfoSec #BLUFFSVulnerability
#BLUFFS #BluetoothHacking #SecureCommunication #CyberAttack #WirelessSecurity πŸ“ΆπŸ›‘οΈ

Source: The Hacker News NIST CVE-2023-24023 Detail and the ACM SIGSAC Conference paper

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst