<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>bluetooth security Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/bluetooth-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 25 Jul 2018 07:57:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Bluetooth Crypto Bug</title>
		<link>https://www.osradar.com/bluetooth-crypto-bug/</link>
					<comments>https://www.osradar.com/bluetooth-crypto-bug/#respond</comments>
		
		<dc:creator><![CDATA[osradar_editor]]></dc:creator>
		<pubDate>Wed, 25 Jul 2018 07:57:13 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[bluetooth]]></category>
		<category><![CDATA[bluetooth bug]]></category>
		<category><![CDATA[bluetooth crypto bug]]></category>
		<category><![CDATA[bluetooth cryptography]]></category>
		<category><![CDATA[bluetooth security]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=5015</guid>

					<description><![CDATA[<p>Bluetooth is one of the most obsolete techs of today’s world, right? Of course, Bluetooth is getting updated but it hardly keeps up with the performance of Wi-Fi and other data sharing systems. Recently, Bluetooth has got another reason to become obsolete with a security bug. The bug is present in the implementation of Bluetooth [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/bluetooth-crypto-bug/">Bluetooth Crypto Bug</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Bluetooth is one of the most obsolete techs of today’s world, right? Of course, Bluetooth is getting updated but it hardly keeps up with the performance of Wi-Fi and other data sharing systems. Recently, Bluetooth has got another reason to become obsolete with a security bug. The bug is present in the implementation of Bluetooth and different system drivers of Apple, Qualcomm, Broadcom, Intel and most likely, other vendors on the line.</p>
<p>The bug occurs because Bluetooth capable devices don’t provide enough encryption parameters while using “secured” Bluetooth connections. To be more precise, pairing devices aren’t sufficiently providing validate elliptic curvature parameters for generating public keys while performing a Diffie-Hellman key exchange.</p>
<p>Thus, the result is a weak pairing that allows a remote hacker to obtain the encryption key and recover the data sent in-between the “secure”ly connected devices.</p>
<h1>Bluetooth and Bluetooth LE affected</h1>
<p>There’s no safe Bluetooth present as it appears. The “Secure Simple Pairing” of Bluetooth and “Secure Connections” of Bluetooth LE pairing processes are affected with the bug. Two scientists from the Israel Institute of Technology, Lior Neumann and Eli Biham discovered the bug. The bug is tracked as <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5383">CVE-2018-5383</a>.</p>
<p>According to a security advisory, CERT/CC published recently as states the explanation of the vulnerability.</p>
<blockquote><p>Bluetooth utilizes a device pairing mechanism based on elliptic-curve Diffie-Hellman (ECDH) key exchange to allow encrypted communication between devices. The ECDH key pair consists of a private and a public key, and the public keys are exchanged to produce a shared pairing key. The devices must also agree on the elliptic curve parameters being used. Previous work on the &#8220;Invalid Curve Attack&#8221; showed that the ECDH parameters are not always validated before being used in computing the resulted shared key, which reduces attacker effort to obtain the private key of the device under attack if the implementation does not validate all of the parameters before computing the shared key.</p>
<p>In some implementations, the elliptic curve parameters are not all validated by the cryptographic algorithm implementation, which may allow a remote attacker within wireless range to inject an invalid public key to determine the session key with high probability. Such an attacker can then passively intercept and decrypt all device messages, and/or forge and inject malicious messages.</p></blockquote>
<h1>Big vendors affected</h1>
<p><img loading="lazy" class="size-full wp-image-5016 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/07/bluetooth-bug.jpg" alt="" width="1200" height="630" srcset="https://www.osradar.com/wp-content/uploads/2018/07/bluetooth-bug.jpg 1200w, https://www.osradar.com/wp-content/uploads/2018/07/bluetooth-bug-300x158.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/07/bluetooth-bug-768x403.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/07/bluetooth-bug-1024x538.jpg 1024w, https://www.osradar.com/wp-content/uploads/2018/07/bluetooth-bug-696x365.jpg 696w, https://www.osradar.com/wp-content/uploads/2018/07/bluetooth-bug-1068x561.jpg 1068w, https://www.osradar.com/wp-content/uploads/2018/07/bluetooth-bug-800x420.jpg 800w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<p>Unfortunately, there are some big names associated with the bug. Giants like Apple, Intel, Qualcomm, and Broadcom have confirmed that their systems are vulnerable due to the bug. Intel, Apple, and Broadcom have released fixes for the bug. Qualcomm has also released necessary fixes.</p>
<p>Microsoft said that their devices are not vulnerable. CERT/CC experts were unable to determine whether Android, Google, and Linux kernel had the bug. But it’s safe to assume that Bluetooth is not safe anymore. That&#8217;s why try to avoid using Bluetooth, especially while transferring confidential files.</p>
<p>However, according to The Bluetooth Special Interest Group (SIG), the organization overseeing the development of Bluetooth standards, have issued a statement regarding this new vulnerability. According to the statement, an attacker has to be in the range of the vulnerable devices for successfully intercepting the data transfer.</p>
<p>The organization has also updated the official Bluetooth specification. Now, the requirement is set so that all devices must validate all parameters for key-based encryptions with Bluetooth connections.</p>
<h1>How to stay safe</h1>
<p><img loading="lazy" class="size-full wp-image-5017 aligncenter" src="https://www.osradar.com/wp-content/uploads/2018/07/stay-safe-image-1.jpg" alt="" width="1024" height="500" srcset="https://www.osradar.com/wp-content/uploads/2018/07/stay-safe-image-1.jpg 1024w, https://www.osradar.com/wp-content/uploads/2018/07/stay-safe-image-1-300x146.jpg 300w, https://www.osradar.com/wp-content/uploads/2018/07/stay-safe-image-1-768x375.jpg 768w, https://www.osradar.com/wp-content/uploads/2018/07/stay-safe-image-1-533x261.jpg 533w, https://www.osradar.com/wp-content/uploads/2018/07/stay-safe-image-1-696x340.jpg 696w, https://www.osradar.com/wp-content/uploads/2018/07/stay-safe-image-1-860x420.jpg 860w" sizes="(max-width: 1024px) 100vw, 1024px" /></p>
<p>There has been no report that the attack was used in the wild but better be safe than sorry, right? If your device is Bluetooth capable, you shouldn’t use it for transferring important files. For example, office documents or anything that contains any type of confidential information should not be transferred using Bluetooth. It’s safe to exchange songs and other normal files that don’t have any clue about any personal info.</p>
<p>If possible, try to avoid Bluetooth usage at all. Use the sharing system only when needed.</p>
<p>Expect to have an update on your system pretty soon including all the desktops, laptops, smartphones and other devices.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/bluetooth-crypto-bug/">Bluetooth Crypto Bug</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/bluetooth-crypto-bug/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
