Unraveling the Wonders of Bluetooth

Continuing its evolution, Bluetooth 3.0 + HS arrived in 2009, introducing the concept of Bluetooth High Speed, leveraging Wi-Fi technology for faster data transfer over short distances.
Bluetooth 4.0, introduced in 2010, marked a significant milestone with the introduction of Bluetooth Low Energy technology.
In 2013, Bluetooth 4.1 enhanced the efficiency and coexistence of Bluetooth devices, allowing seamless operation in increasingly crowded wireless environments.
Most recently, Bluetooth 5.2 and 5.3 have continued to refine the technology, introducing features like LE Audio, a new audio architecture that enhances audio streaming, especially for hearing aids and other assistive listening devices.
Devices equipped with Bluetooth capabilities use a standard protocol to establish connections and exchange data wirelessly.
Discoverable mode enables a device to be seen and identified by other nearby Bluetooth devices.
Non-discoverable mode hides the device from other Bluetooth devices, enhancing privacy and security.
The SDP allows devices to discover services offered by other Bluetooth devices.
Bluetooth LE. Bluetooth Low Energy emerged with Bluetooth 4.0, introducing a power-efficient mode ideal for devices with limited battery capacity.
Bluetooth SIG, the governing body behind Bluetooth technology, continues to introduce new features and improvements to meet the demands of emerging applications and technologies.
Devices like fitness trackers, smartwatches, and health monitoring devices leverage Bluetooth connectivity to relay vital health data, such as heart rate, activity levels, and sleep patterns, empowering users to monitor and improve their well-being.
IoT devices, ranging from smart sensors to industrial machinery, leverage Bluetooth connectivity to communicate and exchange data.
Bluetooth's low-energy variant, Bluetooth Low Energy, has paved the way for beacon technology.
Wireless speakers, soundbars, and home theater systems equipped with Bluetooth connectivity offer users the freedom to stream high-quality audio from their devices without the hassle of cables.
The Bluetooth Special Interest Group, the governing body overseeing Bluetooth technology, continuously evaluates and implements security enhancements.
Bluetooth's journey has seen a steady focus on power efficiency, culminating in the introduction of Bluetooth Low Energy.
Bluetooth's capability for precise indoor positioning and location tracking, facilitated by features like Bluetooth direction-finding, will drive innovation in retail, logistics, healthcare, and more.
Collaboration between Bluetooth and 5G networks will support higher bandwidth and lower latency, enhancing the capabilities of connected devices.
AI integration could optimize Bluetooth networks, improving device interaction and data processing.
Bluetooth Special Interest Group continually updates and refines Bluetooth standards to ensure interoperability and compatibility across devices.


This Cyber News was published on feeds.dzone.com. Publication date: Mon, 22 Jan 2024 17:43:03 +0000


Cyber News related to Unraveling the Wonders of Bluetooth

Unraveling the Wonders of Bluetooth - Continuing its evolution, Bluetooth 3.0 + HS arrived in 2009, introducing the concept of Bluetooth High Speed, leveraging Wi-Fi technology for faster data transfer over short distances. Bluetooth 4.0, introduced in 2010, marked a significant ...
1 year ago Feeds.dzone.com
CVE-2025-21969 - In the Linux kernel, the following vulnerability has been resolved: ...
2 weeks ago
CVE-2024-49950 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 ...
5 months ago Tenable.com
CVE-2021-47038 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: avoid deadlock between hci_dev->lock and socket lock Commit eab2404ba798 ("Bluetooth: Add BT_PHY socket option") added a dependency between socket lock and hci_dev->lock ...
1 year ago Tenable.com
Undocumented commands found in Bluetooth chip used by a billion devices - Armed with this new tool, which enables raw access to Bluetooth traffic, Tarlogic discovered hidden vendor-specific commands (Opcode 0x3F) in the ESP32 Bluetooth firmware that allow low-level control over Bluetooth functions. "Tarlogic Security ...
1 month ago Bleepingcomputer.com
New BLUFFS attack lets attackers hijack Bluetooth connections - Researchers at Eurecom have developed six new attacks collectively named 'BLUFFS' that can break the secrecy of Bluetooth sessions, allowing for device impersonation and man-in-the-middle attacks. Daniele Antonioli, who discovered the attacks, ...
1 year ago Bleepingcomputer.com CVE-2023-24023
CVE-2024-53208 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync This fixes the following crash: ================================================================== BUG: KASAN: ...
3 months ago Tenable.com
Critical Bluetooth Flaw Exposes Android, Apple & Linux Devices to Takeover - Attackers can exploit a critical Bluetooth security vulnerability that's been lurking largely unnoticed for years on macOS, iOS, Android, and Linux device platforms. The keystroke injection vulnerability allows an attacker to control the targeted ...
1 year ago Darkreading.com CVE-2023-45866
CVE-2024-58013 - In the Linux kernel, the following vulnerability has been resolved: ...
1 month ago
CVE-2024-53207 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix possible deadlocks This fixes possible deadlocks like the following caused by hci_cmd_sync_dequeue causing the destroy function to run: INFO: task ...
3 months ago Tenable.com
CVE-2024-54460 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: iso: Fix circular lock in iso_listen_bis This fixes the circular locking dependency warning below, by releasing the socket lock before enterning iso_listen_bis, to avoid ...
3 months ago Tenable.com
CVE-2024-26890 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: fix out of bounds memory access The problem is detected by KASAN. btrtl driver uses private hci data to store 'struct btrealtek_data'. If btrtl driver is used with ...
11 months ago Tenable.com
Undocumented backdoor found in Bluetooth chip used by a billion devices - "In a context where you can compromise an IOT device with as ESP32 you will be able to hide an APT inside the ESP memory and perform Bluetooth (or Wi-Fi) attacks against other devices, while controlling the device over Wi-Fi/Bluetooth," explained the ...
1 month ago Bleepingcomputer.com
CVE-2024-50255 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci: fix null-ptr-deref in hci_read_supported_codecs Fix __hci_cmd_sync_sk() to return not NULL for unknown opcodes. __hci_cmd_sync_sk() returns NULL if a command returns ...
5 months ago Tenable.com
CVE-2022-48871 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
'Wall of Flippers' detects Flipper Zero Bluetooth spam attacks - A new Python project called 'Wall of Flippers' detects Bluetooth spam attacks launched by Flipper Zero and Android devices. By detecting the attacks and identifying their origin, users can take targeted protection measures, and culprits can ...
1 year ago Bleepingcomputer.com
Bluetooth Flaw Let Hackers Takeover of iOS & Android Devices - Bluetooth vulnerabilities in Android, Linux, macOS, iOS, and Windows are critical as hackers could exploit them to gain unauthorized access to the vulnerable devices. Such flaws in Bluetooth protocols enable the threat actors to steal sensitive data, ...
1 year ago Cybersecuritynews.com
Apple 'Find My' network can be abused to steal keylogged passwords - Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards. The Find My network and application is designed to help users locate lost or misplaced ...
1 year ago Bleepingcomputer.com
Europol Raises Alarm on Criminal Misuse of Bluetooth Trackers - Europol has issued a new warning regarding an emerging trend in organized crime involving the use of Bluetooth trackers. Originally designed to help individuals locate personal items and prevent vehicle theft, these small devices are being ...
1 year ago Infosecurity-magazine.com
CVE-2024-36968 - In the Linux kernel, the following vulnerability has been resolved: ...
10 months ago
New Bluetooth Vulnerability Leak Your Passcode to Hackers During Pairing - To mitigate this risk, Bluetooth Core Specification 5.4 advises that devices should fail a pairing procedure if a peer’s public key X coordinate matches that of the local device, except when a debug key is used. This vulnerability, known as ...
6 months ago Cybersecuritynews.com CVE-2020-26558
CVE-2021-21367 - Switchboard Bluetooth Plug for elementary OS from version 2.3.0 and before version version 2.3.5 has an incorrect authorization vulnerability. When the Bluetooth plug is running (in discoverable mode), Bluetooth service requests and pairing requests ...
4 years ago
CVE-2024-57894 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_core: Fix sleeping function called from invalid context This reworks hci_cb_list to not use mutex hci_cb_list_lock to avoid bugs like the bellow: BUG: sleeping ...
3 months ago Tenable.com
CVE-2024-54191 - In the Linux kernel, the following vulnerability has been resolved: Bluetooth: iso: Fix circular lock in iso_conn_big_sync This fixes the circular locking dependency warning below, by reworking iso_sock_recvmsg, to ensure that the socket lock is ...
3 months ago Tenable.com
Flipper Zero Bluetooth spam attacks ported to new Android app - Recent Flipper Zero Bluetooth spam attacks have now been ported to an Android app, allowing a much larger number of devices to implement these annoying spam alerts. Inspired by previous research on the topic and Flipper Zero applets targeting iOS ...
1 year ago Bleepingcomputer.com Rocke

Latest Cyber News


Cyber Trends (last 7 days)