Google's Fast Pair Vulnerability Leaves Earbuds, Headphones Susceptible to Hacking
A recent discovery has exposed a significant vulnerability in Google's Fast Pair technology, which is used by many Bluetooth devices. The bug, dubbed WhisperPair, allows hackers to hijack devices and gain unauthorized access to sensitive information such as location data and microphone recordings.
The research team from KU Leuven University found that the widespread use of Fast Pair has left earbuds, headphones, and other audio devices vulnerable to remote hacking. This is because many devices fail to properly check if they're in pairing mode before accepting a connection request, allowing attackers to force connections through the regular Bluetooth pairing process.
According to the researchers, an attacker can gain control of a vulnerable device in as little as 10 seconds at ranges up to 14 meters. Once connected, hackers can perform relatively innocuous actions such as interrupting audio streams or playing custom audio, but also access more sensitive information like location tracking and microphone recordings.
The vulnerability affects over a dozen devices from multiple manufacturers, including Sony, Nothing, JBL, OnePlus, and Google itself. While Google has acknowledged the flaw and notified its partners, it's up to individual companies to create patches for their accessories, which may take weeks or months to be fully resolved.
Google has pushed an update to its own vulnerable devices, but researchers suggest that this patch can also be bypassed. The company has stated that it is not aware of WhisperPair being used in the wild, but with the bug now public knowledge, the risk of exploitation increases.
To mitigate this vulnerability, users are advised to factory reset their headphones and keep the official app installed to receive firmware updates as soon as they're available.
A recent discovery has exposed a significant vulnerability in Google's Fast Pair technology, which is used by many Bluetooth devices. The bug, dubbed WhisperPair, allows hackers to hijack devices and gain unauthorized access to sensitive information such as location data and microphone recordings.
The research team from KU Leuven University found that the widespread use of Fast Pair has left earbuds, headphones, and other audio devices vulnerable to remote hacking. This is because many devices fail to properly check if they're in pairing mode before accepting a connection request, allowing attackers to force connections through the regular Bluetooth pairing process.
According to the researchers, an attacker can gain control of a vulnerable device in as little as 10 seconds at ranges up to 14 meters. Once connected, hackers can perform relatively innocuous actions such as interrupting audio streams or playing custom audio, but also access more sensitive information like location tracking and microphone recordings.
The vulnerability affects over a dozen devices from multiple manufacturers, including Sony, Nothing, JBL, OnePlus, and Google itself. While Google has acknowledged the flaw and notified its partners, it's up to individual companies to create patches for their accessories, which may take weeks or months to be fully resolved.
Google has pushed an update to its own vulnerable devices, but researchers suggest that this patch can also be bypassed. The company has stated that it is not aware of WhisperPair being used in the wild, but with the bug now public knowledge, the risk of exploitation increases.
To mitigate this vulnerability, users are advised to factory reset their headphones and keep the official app installed to receive firmware updates as soon as they're available.