Uncategorized

BLURTOOTH

Another Alert Condition In Bluetooth Technology

A new attack strategy, BLURtooth is used to grant unauthorized access by overwriting the authentication keys within the wireless range.

What is really happening in this Attack?

  • The BLURtooth vulnerability affects the component named Cross-Transport Key Derivation (CTKD) in the devices using the Bluetooth standard 4.0 through 5.0.
  • Using this vulnerability, the attacker can control the CTKD component of any device.
  • They can either completely overwrite authentication keys or downgrade them to use weak encryption.
  • This allows access to Bluetooth-capable services on the targeted device.

How to be secured?

  • Avoid communicating sensitive information like passwords through Bluetooth.
  • The “Discoverable” mode should be enabled only when situation demands where pairing is recommended.
  • Turnoff Bluetooth while not in use.
  • Always update Bluetooth-enabled devices to patch any exploitable flaws.
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Most Popular

To Top