DATA DOCTORS

What you need to know about Bluetooth vulnerability

Aug 24, 2019, 5:11 AM

(Getty Images Photo/Ethan Miller)...

(Getty Images Photo/Ethan Miller)

(Getty Images Photo/Ethan Miller)

Q: How dangerous is the KNOB Bluetooth vulnerability and what should I be doing to protect my phone?

A: Security researchers recently discovered a way to intercept a Bluetooth connection between two devices, leading to the ability to plainly view all of the data being transmitted between the two devices.

The “attack” was successful on 17 different kinds of Bluetooth chips on 24 different devices that they tested, which means that every popular brand of device that uses Bluetooth is vulnerable.

It’s being referred to as the KNOB (Key Negotiation of Bluetooth) attack because it changes the initial connection process when two devices are being paired together.

In essence, the security researchers figured out how to lower the encryption level used to keep Bluetooth connections secured, by jumping in during the initial negotiation process prior to making a connection.

The Bluetooth Special Interest Group, an International organization in charge of Bluetooth standards issued a security warning and developed the basic fix that will they provided to hardware manufacturers to implement and distribute.

Proof of concept

While many technology reporters are creating lots of scary sounding headlines about how unsafe Bluetooth is now that this vulnerability is public, it’s a bit overblown.

The security researchers were able to create a specific situation in their labs to take advantage of the exploit, which only proved that it could be done, not that it is being done.

In order to actually pull this off in real life, the perpetrator would need a really specialized and expensive piece of equipment, be relatively nearby and could only exploit the connection at the very moment that the two devices where attempting to pair with one another.

Even if they were to be in the right place at the right time, if you’re not using Bluetooth to transmit sensitive data, all they would intercept is what song you’re listening to on your ear buds or in your car.

It’s just too complicated and random for it to be attractive to sophisticated cyber-thieves, so despite the scary headlines, you’re not suddenly vulnerable because you use a Bluetooth headset, keyboard or mouse.

This vulnerability does not apply to newer BLE (Bluetooth Low Energy) devices like fitness devices, proximity sensors or medical devices.

The fix is in

The companies that make Bluetooth chips were actually notified last November so they could work on creating patches before the information became public.

Most major device manufacturers have been including the fix in their recent updates, so if you keep your devices updated regularly, it’s quite possible that you already have the fix installed.

Turn Bluetooth off

There are other serious Bluetooth vulnerabilities such as BlueBorne that exist and new methods will likely be discovered in the future, so it’s always a good idea to turn off Bluetooth when you aren’t using it.

Another small benefit to turning it off is that it helps with precious battery life. A typical Bluetooth radio is routinely scanning for devices to connect to that come into range.

Bluetooth wasn’t developed with security as its primary focus – hopefully that will change – so expect to hear about more discoveries down the road and keep all your devices updated.

Data Doctors

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can ma...

Data Doctors

Here are all the tips we know regarding how to spot deep fake videos

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can make detection a bit more difficult.

3 days ago

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

10 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

17 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

24 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are the truly free smartphone video editing apps

The processing power on our smartphones has grown exponentially, allowing anyone to perform sophisticated video editing easily.

1 month ago

Google Maps app....

Data Doctors

How to rediscover places visited years ago on Google maps

Whether you're an Android or iOS user, or prefer accessing Google Maps on your computer, you'll find step-by-step instructions to unlock your travel memories effortlessly.

1 month ago

Sponsored Articles

...

DISC Desert Institute for Spine Care

Sciatica pain is treatable but surgery may be required

Sciatica pain is one of the most common ailments a person can face, and if not taken seriously, it could become one of the most harmful.

...

Fiesta Bowl Foundation

The 51st annual Vrbo Fiesta Bowl Parade is excitingly upon us

The 51st annual Vrbo Fiesta Bowl Parade presented by Lerner & Rowe is upon us! The attraction honors Arizona and the history of the game.

(KTAR News Graphic)...

Boys & Girls Clubs

KTAR launches online holiday auction benefitting Boys & Girls Clubs of the Valley

KTAR is teaming up with The Boys & Girls Clubs of the Valley for a holiday auction benefitting thousands of Valley kids.

What you need to know about Bluetooth vulnerability