Geekzone: technology news, blogs, forums
Guest
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.


#223116 13-Sep-2017 14:51
Send private message

Looks like a major vulnerability has been revealed in Bluetooth

 

https://www.armis.com/blueborne/

 

Synopsis:

 

BlueBorne is an attack vector by which hackers can leverage Bluetooth connections to penetrate and take complete control over targeted devices. BlueBorne affects ordinary computers, mobile phones, and the expanding realm of IoT devices. The attack does not require the targeted device to be paired to the attacker’s device, or even to be set on discoverable mode. Armis Labs has identified eight zero-day vulnerabilities so far, which indicate the existence and potential of the attack vector.

 

 

 

It appears only our iFriends are safe(ish).


Create new topic
Dynamic
3867 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #1864601 13-Sep-2017 16:19
Send private message

Wow.  This is potentially quite serious.  If someone turns this exploit into a viable worm that self-replicates from device to device, a visit to a public place with your smartphone or tablet becomes hazardous.

 

Windows 7 and above will automatically be patched in the coming weeks.

 

iOS 10 devices are not vulnerable assuming the users have OK'd iOS updates...  but I think anyone with an iPhone 4s and below is vulnerable.

 

I assume most IoT devices don't have an easy semi-automated patching system, but it may not be worth trying to exploit these unless there is a common code base.

 

Are Android users still at the mercy of manufacturers and Telcos to roll out updates or does Android now have a centralised patching system?

 

 





“Don't believe anything you read on the net. Except this. Well, including this, I suppose.” Douglas Adams

 

Referral links to services I use, really like, and may be rewarded if you sign up:
PocketSmith for budgeting and personal finance management.  A great Kiwi company.




BarTender
3606 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #1864603 13-Sep-2017 16:20
Send private message

Just read this ARS article on it: https://arstechnica.com/information-technology/2017/09/bluetooth-bugs-open-billions-of-devices-to-attacks-no-clicking-required/

 

One word is "ouch" followed by "switch off all your bluetooth"


BarTender
3606 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #1864604 13-Sep-2017 16:22
Send private message

And if you just feel like watching the YouTube videos:

 

Android:

 

Linux:

 

Windows:




gished
276 posts

Ultimate Geek


  #1864948 14-Sep-2017 09:04
Send private message

Given that this is a newly discovered exploit how likely would there really be something out in the wild? I'm sure given enough time something would appear but in terms of now and the next couple of weeks or so?


muppet
2568 posts

Uber Geek

Trusted

  #1864956 14-Sep-2017 09:06
Send private message

My Pixel is just installing the patch for this now.

 

My old Nexus 6 might not be as lucky.


muppet
2568 posts

Uber Geek

Trusted

  #1864978 14-Sep-2017 09:13
Send private message

Sorry to reply to myself, but Android users there's a vulnerability scanner app here.


1101
3122 posts

Uber Geek


  #1865039 14-Sep-2017 10:24
Send private message

So, because so many Android phone & tablet Manufacturers abandon mid price devices after release, and NEVER release updates.....(cough cough Samsung)
..Millions of Android users will never see a patch to fix this ?


 
 
 

Move to New Zealand's best fibre broadband service (affiliate link). Note that to use Quic Broadband you must be comfortable with configuring your own router.
muppet
2568 posts

Uber Geek

Trusted

  #1865067 14-Sep-2017 10:28
Send private message

1101:

 

So, because so many Android phone & tablet Manufacturers abandon mid price devices after release, and NEVER release updates.....(cough cough Samsung)
..Millions of Android users will never see a patch to fix this ?

 

 

That's right.  Think about all those car head units out there.

 

I wonder how many Samsung TVs etc are vulnerable to this too.  It's a pretty major issue.

 

As much as I hate Samsung and will never, ever buy another one of their terrible phones, they ARE getting better with security updates.  I see that the Galaxy S5, quite an old phone now, got the September patch today.


geocom
594 posts

Ultimate Geek

Subscriber

  #1877371 4-Oct-2017 16:30
Send private message

Almost a month on now My 1plus5 has finally been patched with the September update.

 

My Android wear watch is still vulnerable and given how long it took for them to get the Android Wear 2.0 patch out I could be waiting awhile.

 

This is definitely the one area Android need to get much better at and fast google making the security patches seperate was good but they should have gone much further in forcing manufactures to update quickly.





Geoff E


vyfster
67 posts

Master Geek


  #1877381 4-Oct-2017 17:12
Send private message

My Android phone (Sony Xperia) is just less than 3 years old.  I have to turn off bluetooth now because it no longer gets updates and hasn't for some time, otherwise I am left wide open to who knows what kind of attacks.  It wasn't a cheap phone at the time ($1k) and there is nothing wrong with it, except that I can no longer use bluetooth if I want to make sure I am not vulnerable to this attack.

 

Surely I am not being unreasonable to expect a fix for something that, if not patched, will result in me losing functionality that I paid dearly for?  Or am I wrong? 


Dynamic
3867 posts

Uber Geek

ID Verified
Trusted
Lifetime subscriber

  #1877401 4-Oct-2017 18:15
Send private message

vyfster: My Android phone (Sony Xperia) is just less than 3 years old.  I have to turn off bluetooth now because it no longer gets updates and hasn't for some time, otherwise I am left wide open to who knows what kind of attacks.  It wasn't a cheap phone at the time ($1k) and there is nothing wrong with it, except that I can no longer use bluetooth if I want to make sure I am not vulnerable to this attack.

 

Surely I am not being unreasonable to expect a fix for something that, if not patched, will result in me losing functionality that I paid dearly for?  Or am I wrong?

 

I'm wondering whether this is a suitable candidate for a CGA claim...?





“Don't believe anything you read on the net. Except this. Well, including this, I suppose.” Douglas Adams

 

Referral links to services I use, really like, and may be rewarded if you sign up:
PocketSmith for budgeting and personal finance management.  A great Kiwi company.


Create new topic





News and reviews »

Air New Zealand Starts AI adoption with OpenAI
Posted 24-Jul-2025 16:00


eero Pro 7 Review
Posted 23-Jul-2025 12:07


BeeStation Plus Review
Posted 21-Jul-2025 14:21


eero Unveils New Wi-Fi 7 Products in New Zealand
Posted 21-Jul-2025 00:01


WiZ Introduces HDMI Sync Box and other Light Devices
Posted 20-Jul-2025 17:32


RedShield Enhances DDoS and Bot Attack Protection
Posted 20-Jul-2025 17:26


Seagate Ships 30TB Drives
Posted 17-Jul-2025 11:24


Oclean AirPump A10 Water Flosser Review
Posted 13-Jul-2025 11:05


Samsung Galaxy Z Fold7: Raising the Bar for Smartphones
Posted 10-Jul-2025 02:01


Samsung Galaxy Z Flip7 Brings New Edge-To-Edge FlexWindow
Posted 10-Jul-2025 02:01


Epson Launches New AM-C550Z WorkForce Enterprise printer
Posted 9-Jul-2025 18:22


Samsung Releases Smart Monitor M9
Posted 9-Jul-2025 17:46


Nearly Half of Older Kiwis Still Write their Passwords on Paper
Posted 9-Jul-2025 08:42


D-Link 4G+ Cat6 Wi-Fi 6 DWR-933M Mobile Hotspot Review
Posted 1-Jul-2025 11:34


Oppo A5 Series Launches With New Levels of Durability
Posted 30-Jun-2025 10:15









Geekzone Live »

Try automatic live updates from Geekzone directly in your browser, without refreshing the page, with Geekzone Live now.



Are you subscribed to our RSS feed? You can download the latest headlines and summaries from our stories directly to your computer or smartphone by using a feed reader.