Hackers have developed methods for data theft and covert listening via Bluetooth earphones.
In a concerning development, a group of researchers has discovered three serious vulnerabilities in Airoha microchips, a common component in Bluetooth headsets, TWS earbuds, wireless speakers, and microphones, used by popular brands such as Anker, Jabra, QCY, 1MORE, Tronsmart, JBL, and many others.
These vulnerabilities pose a significant threat to headset owners, as they could potentially expose their personal data. The implications for manufacturers of devices with Airoha chipsets are also concerning, as the vulnerabilities could potentially impact the privacy of users who use these devices.
The vulnerabilities discovered in Airoha chipsets can potentially be exploited by hackers, granting them access to personal data and potentially turning audio devices into spy tools. Malicious software can be installed on a compromised device, providing hackers with control over microphone functions.
Bluetooth vulnerabilities have been exploited in the past to infiltrate smart ecosystems, such as eavesdropping on conversations or gaining access to voice assistants. In 2023, a group of researchers from Singapore proved the possibility of mass connecting to random Bluetooth headsets in the metro using portable transmitters and automation scripts. Attackers can initiate a connection with a victim's headphones in public places, secretly gaining audio access, especially if the headset remains in pairing mode.
To protect your privacy from these vulnerabilities, users are advised to take several practical steps. Firstly, update the firmware and software of your devices promptly if updates are released by device manufacturers or chipset vendors. These patches often fix critical vulnerabilities by closing security loopholes.
Secondly, limit Bluetooth usage and visibility by disabling Bluetooth when not in use and avoiding pairing devices in public or untrusted environments.
Thirdly, use devices from trusted brands that provide timely security patches and updates.
Fourthly, monitor device behaviour and network activity for unusual signs such as unexpected device behaviour, battery drain, or connectivity issues, which could indicate exploitation.
Fifthly, keep your smartphone and connected devices updated with the latest security updates.
Sixthly, consider using wired options or trusted Bluetooth devices without these vulnerabilities if your Bluetooth audio accessories remain unpatched for extended periods.
These steps are essential due to the serious risk that attackers can take control of vulnerable devices remotely, compromising your privacy and security. The vulnerabilities were found in Airoha chipsets that support Bluetooth 5.0/5.2 and various audio codecs like AAC, aptX, and LDAC.
To minimise risks, check the model of your devices, avoid using Bluetooth in public places, especially in pairing/discovery modes, regularly update the firmware of your audio devices, turn off Bluetooth when not in use, and avoid connecting devices to unfamiliar smartphones and PCs.
Many manufacturers have already announced firmware updates for headsets based on Airoha, so it is recommended to check for updates regularly. By taking these precautions, you can help protect your privacy and maintain the high-quality sound and low latency provided by Airoha chipsets.
- The vulnerabilities found in Airoha chipsets, used by popular brands, pose a significant cybersecurity risk as they could potentially expose personal data and turn audio devices into spy tools, emphasizing the importance of promptly updating devices to secure patched firmware and software.
- In light of the discovery of serious vulnerabilities in Airoha chipsets, it's essential for manufacturers to ensure timely release of firmware updates for devices with these components, considering the potential privacy and security implications for users who utilize them.