HomeCyber SecurityHackers Exploit New BLUFFS Attack on Bluetooth Connections

Hackers Exploit New BLUFFS Attack on Bluetooth Connections

BLUFFS Attack – CVE-2023-24023 – Researchers at Eurecom have uncovered six new exploits collectively named ‘BLUFFS’, capable of breaching the confidentiality of Bluetooth sessions. Unlike typical attacks dependent on specific hardware or software configurations, BLUFFS exposes two previously unknown architectural flaws in the Bluetooth standard. These vulnerabilities are tracked under the identifier CVE-2023-24023. CVE-2023-24023 affect Bluetooth Core Specification 4.2 through 5.4, raising concerns about the security of billions of devices, including laptops, smartphones, and other common mobile devices.

 

Understanding BLUFFS: Breaking Bluetooth’s Secrecy

BLUFFS isn’t your typical attack, it comprises exploits aimed at compromising the confidentiality of both past and future Bluetooth sessions. The attack relies on four flaws in the session key derivation process, two of which researchers had not discovered before.

By exploiting these flaws, attackers force the derivation of a short and predictable session key (SKC). Subsequently, the attacker employs brute-force techniques to decrypt historical communications and manipulate future interactions.

BLUFFS Attack Step. Source: (dl.acm.org)
BLUFFS Attack Step

The crux of BLUFFS lies in the attacker’s ability to be within Bluetooth range of two communicating devices. The attacker, posing as one of the devices, manipulates the negotiation process for a weak session key.

Negotiating a session key while spoofing
Negotiating a session key while spoofing a legitimate party. Source: dl.acm.org

This involves proposing the lowest possible key entropy value and utilizing a constant session key diversifier. The attack is agnostic to whether the victims support Secure Connections (SC) or Legacy Secure Connections (LSC), making it a pervasive threat.

The released paper outlines six BLUFFS attack variations, encompassing different combinations of impersonation and Man-in-the-Middle (MitM) tactics. These strategies remain effective irrespective of the victim’s support for Secure Connections (SC) or Legacy Secure Connections (LSC).

The researchers developed and shared a toolkit on GitHub that demonstrates the effectiveness of BLUFFS. It includes a Python script to test the attacks, the ARM patches, the parser, and the PCAP samples captured during their tests.

 

Impact and Mitigation Strategies

BLUFFS impacts Bluetooth versions 4.2 through the latest 5.4, affecting devices dating back to December 2014. The researchers tested BLUFFS against various devices running Bluetooth versions 4.1 through 5.2, confirming susceptibility to at least three out of six BLUFFS attacks. The proposed backward-compatible modifications include introducing a new “Key Derivation Function” (KDF) for Legacy Secure Connections (LSC), mutual nonce exchange, and verification, shared pairing keys, enforcing Secure Connections (SC) mode, and maintaining a cache of session key diversifiers to prevent reuse.

List of Tested Device
List of Tested Device. Source: dl.acm.org

Bluetooth SIG, the organization overseeing Bluetooth standard development, has acknowledged the report from Eurecom and published a statement on its site. In response, they advocate for rejecting connections with low key strengths, employing ‘Security Mode 4 Level 4’ for higher encryption strength, and operating in ‘Secure Connections Only’ mode during pairing. These recommendations aim to bolster session key derivation and mitigate not only BLUFFS but also similar threats, underlining the ongoing efforts to fortify Bluetooth security.

Christin
Christinhttps://secry.me/explore
A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

5 × one =

Most Popular

GOOGLE ADVERTISEMENT

- Advertisement -