Google Fast Pair Vulnerability Exposes Users' Audio Devices to Hackers
A recent discovery has revealed a major security flaw in 17 Google Fast Pair-enabled audio devices that can allow hackers to eavesdrop on users and track their location. The vulnerability, dubbed WhisperPair, was discovered by researchers at Belgium's KU Leuven University Computer Security and Industrial Cryptography group.
According to the researchers, the issue arises from a faulty implementation of Google's one-tap (Fast Pair) protocol, which allows new connections while an audio device is in pairing mode. This can be exploited by hackers who can pair with devices using their own device model number and only need to remain within Bluetooth range for 15 seconds.
In this timeframe, hackers can turn on the microphone, listen to ambient sound, inject audio, or even track a user's location. Researchers demonstrated the vulnerability in a video report, showing how an attacker could hijack a device in under 15 seconds.
Google has acknowledged the issue and informed its OEM partners of the necessary fixes in September. The company also updated its Validator certification tool and certification requirements to prevent similar vulnerabilities in the future.
While Google's Pixel Buds are reportedly patched and protected, other affected devices from various manufacturers, including Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google, may still be vulnerable. Researchers have created a search tool that allows users to check if their audio accessories are at risk.
In response to the vulnerability, device manufacturers such as OnePlus and Marshall have issued statements confirming they are investigating the issue and will take steps to protect user security and privacy. However, one concern raised by researchers is that many users may fail to install third-party manufacturer's apps required for updates, leaving their devices exposed.
Google has assured users that it takes the vulnerability seriously and is working with its partners to reduce the risk of similar vulnerabilities in the future.
A recent discovery has revealed a major security flaw in 17 Google Fast Pair-enabled audio devices that can allow hackers to eavesdrop on users and track their location. The vulnerability, dubbed WhisperPair, was discovered by researchers at Belgium's KU Leuven University Computer Security and Industrial Cryptography group.
According to the researchers, the issue arises from a faulty implementation of Google's one-tap (Fast Pair) protocol, which allows new connections while an audio device is in pairing mode. This can be exploited by hackers who can pair with devices using their own device model number and only need to remain within Bluetooth range for 15 seconds.
In this timeframe, hackers can turn on the microphone, listen to ambient sound, inject audio, or even track a user's location. Researchers demonstrated the vulnerability in a video report, showing how an attacker could hijack a device in under 15 seconds.
Google has acknowledged the issue and informed its OEM partners of the necessary fixes in September. The company also updated its Validator certification tool and certification requirements to prevent similar vulnerabilities in the future.
While Google's Pixel Buds are reportedly patched and protected, other affected devices from various manufacturers, including Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google, may still be vulnerable. Researchers have created a search tool that allows users to check if their audio accessories are at risk.
In response to the vulnerability, device manufacturers such as OnePlus and Marshall have issued statements confirming they are investigating the issue and will take steps to protect user security and privacy. However, one concern raised by researchers is that many users may fail to install third-party manufacturer's apps required for updates, leaving their devices exposed.
Google has assured users that it takes the vulnerability seriously and is working with its partners to reduce the risk of similar vulnerabilities in the future.