Bluetooth is used in everything from speakers to implanted pacemakers, which means that
Researchers from Singapore University of Technology and Design began developing techniques for analyzing
Collectively dubbed “SweynTooth,” the flaws exist not in BLE itself, but in the BLE software development kits that come with seven system on a
The SweynTooth bugs can’t be exploited over the internet, but a hacker within radio range could launch attacks to crash targeted devices entirely, disable their BLE connection until a restart, or in some cases even bypass BLE’s secure pairing mode to take them over. In addition to all manner of smart home and enterprise devices, the list includes pacemakers, blood glucose monitors,
As problematic as the vulnerabilities could be in smart home devices or office equipment, the stakes are clearly higher in the medical context. The researchers did not develop proof of concept attacks against any of the potentially vulnerable medical devices, but the relevant SoCs contain bugs that could be used to crash the communication functions or the whole device. Manufacturers will need to individually test each of their products that rely on a vulnerable SoC to determine which attacks would be feasible in practice and what patches are necessary. And the researchers note that it’s important for manufacturers to consider how an attacker could chain the SweynTooth vulnerabilities with other possible remote access attacks to cause even
Any device that wants to advertise Bluetooth as a feature and use the Bluetooth logo goes through a certification process to ensure interoperability across devices. In this case, though, the SoC manufacturers missed some basic security
“We were quite surprised to find these kinds of really bad issues in prominent vendors,” says
Bluetooth and BLE implementation issues are common, partly because the Bluetooth and BLE standards are massive
“Some of the vendors we contacted originally, the engineers said, ‘Well, the reason you’re getting these issues is that you’re putting in values that are not expected, not within the specification,’” Chattopadhyay says. “But you can’t only be testing for a benign environment. We’re talking about an attacker here. He doesn’t care about
The researchers notified seven SoC makers about the vulnerabilities.
“Imagine the time it takes for a single pacemaker to get an update and the kind of process to update it in the field,” says
The researchers emphasize that even more products than the hundreds they’ve already identified are likely vulnerable, because it’s difficult to know where manufacturers have used impacted SoCs. Now that the SweynTooth findings are public, it’s possible that more vulnerable SoCs will come to light as well as the Singapore University of Technology and Design group and other researchers around the world
The FDA is assessing the SweynTooth Bluetooth Low Energy chipset vulnerabilities. The FDA continues to assess new information concerning emergent cybersecurity vulnerabilities and will keep the public informed if significant new information
The vulnerabilities are difficult to exploit in practice and expose different devices to different degrees. But they underscore just how critical