Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


notesgnome

130 posts

Master Geek
+1 received by user: 91

ID Verified
Lifetime subscriber

#223116 13-Sep-2017 14:51
Send private message

Looks like a major vulnerability has been revealed in Bluetooth

 

https://www.armis.com/blueborne/

 

Synopsis:

 

BlueBorne is an attack vector by which hackers can leverage Bluetooth connections to penetrate and take complete control over targeted devices. BlueBorne affects ordinary computers, mobile phones, and the expanding realm of IoT devices. The attack does not require the targeted device to be paired to the attacker’s device, or even to be set on discoverable mode. Armis Labs has identified eight zero-day vulnerabilities so far, which indicate the existence and potential of the attack vector.

 

 

 

It appears only our iFriends are safe(ish).


Create new topic
Dynamic
4015 posts

Uber Geek
+1 received by user: 1851

ID Verified
Trusted
Lifetime subscriber

  #1864601 13-Sep-2017 16:19
Send private message

Wow.  This is potentially quite serious.  If someone turns this exploit into a viable worm that self-replicates from device to device, a visit to a public place with your smartphone or tablet becomes hazardous.

 

Windows 7 and above will automatically be patched in the coming weeks.

 

iOS 10 devices are not vulnerable assuming the users have OK'd iOS updates...  but I think anyone with an iPhone 4s and below is vulnerable.

 

I assume most IoT devices don't have an easy semi-automated patching system, but it may not be worth trying to exploit these unless there is a common code base.

 

Are Android users still at the mercy of manufacturers and Telcos to roll out updates or does Android now have a centralised patching system?

 

 





“Don't believe anything you read on the net. Except this. Well, including this, I suppose.” Douglas Adams




BarTender
3629 posts

Uber Geek
+1 received by user: 2572

ID Verified
Trusted
Lifetime subscriber

  #1864603 13-Sep-2017 16:20
Send private message

Just read this ARS article on it: https://arstechnica.com/information-technology/2017/09/bluetooth-bugs-open-billions-of-devices-to-attacks-no-clicking-required/

 

One word is "ouch" followed by "switch off all your bluetooth"


BarTender
3629 posts

Uber Geek
+1 received by user: 2572

ID Verified
Trusted
Lifetime subscriber

  #1864604 13-Sep-2017 16:22
Send private message

And if you just feel like watching the YouTube videos:

 

Android:

 

Linux:

 

Windows:




gished
276 posts

Ultimate Geek
+1 received by user: 10


  #1864948 14-Sep-2017 09:04
Send private message

Given that this is a newly discovered exploit how likely would there really be something out in the wild? I'm sure given enough time something would appear but in terms of now and the next couple of weeks or so?


muppet
2642 posts

Uber Geek
+1 received by user: 1660

Trusted

  #1864956 14-Sep-2017 09:06
Send private message

My Pixel is just installing the patch for this now.

 

My old Nexus 6 might not be as lucky.


muppet
2642 posts

Uber Geek
+1 received by user: 1660

Trusted

  #1864978 14-Sep-2017 09:13
Send private message

Sorry to reply to myself, but Android users there's a vulnerability scanner app here.


 
 
 

Shop now at Mighty Ape (affiliate link).
1101
3141 posts

Uber Geek
+1 received by user: 1143


  #1865039 14-Sep-2017 10:24
Send private message

So, because so many Android phone & tablet Manufacturers abandon mid price devices after release, and NEVER release updates.....(cough cough Samsung)
..Millions of Android users will never see a patch to fix this ?


muppet
2642 posts

Uber Geek
+1 received by user: 1660

Trusted

  #1865067 14-Sep-2017 10:28
Send private message

1101:

 

So, because so many Android phone & tablet Manufacturers abandon mid price devices after release, and NEVER release updates.....(cough cough Samsung)
..Millions of Android users will never see a patch to fix this ?

 

 

That's right.  Think about all those car head units out there.

 

I wonder how many Samsung TVs etc are vulnerable to this too.  It's a pretty major issue.

 

As much as I hate Samsung and will never, ever buy another one of their terrible phones, they ARE getting better with security updates.  I see that the Galaxy S5, quite an old phone now, got the September patch today.


geocom
597 posts

Ultimate Geek
+1 received by user: 143

Subscriber

  #1877371 4-Oct-2017 16:30
Send private message

Almost a month on now My 1plus5 has finally been patched with the September update.

 

My Android wear watch is still vulnerable and given how long it took for them to get the Android Wear 2.0 patch out I could be waiting awhile.

 

This is definitely the one area Android need to get much better at and fast google making the security patches seperate was good but they should have gone much further in forcing manufactures to update quickly.





Geoff E


vyfster
67 posts

Master Geek
+1 received by user: 9


  #1877381 4-Oct-2017 17:12
Send private message

My Android phone (Sony Xperia) is just less than 3 years old.  I have to turn off bluetooth now because it no longer gets updates and hasn't for some time, otherwise I am left wide open to who knows what kind of attacks.  It wasn't a cheap phone at the time ($1k) and there is nothing wrong with it, except that I can no longer use bluetooth if I want to make sure I am not vulnerable to this attack.

 

Surely I am not being unreasonable to expect a fix for something that, if not patched, will result in me losing functionality that I paid dearly for?  Or am I wrong? 


Dynamic
4015 posts

Uber Geek
+1 received by user: 1851

ID Verified
Trusted
Lifetime subscriber

  #1877401 4-Oct-2017 18:15
Send private message

vyfster: My Android phone (Sony Xperia) is just less than 3 years old.  I have to turn off bluetooth now because it no longer gets updates and hasn't for some time, otherwise I am left wide open to who knows what kind of attacks.  It wasn't a cheap phone at the time ($1k) and there is nothing wrong with it, except that I can no longer use bluetooth if I want to make sure I am not vulnerable to this attack.

 

Surely I am not being unreasonable to expect a fix for something that, if not patched, will result in me losing functionality that I paid dearly for?  Or am I wrong?

 

I'm wondering whether this is a suitable candidate for a CGA claim...?





“Don't believe anything you read on the net. Except this. Well, including this, I suppose.” Douglas Adams


Create new topic








Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.