Smartphones, laptops, IoT devices vulnerable to new BIAS Bluetooth attack

[embedded content]

Academics have disclosed today a new vulnerability in the Bluetooth wireless protocol, broadly used to interconnect modern devices, such as smartphones, tablets, laptops, and smart IoT devices.

The vulnerability, codenamed BIAS (Bluetooth Impersonation AttackS), impacts the classic version of the Bluetooth protocol, also known as Basic Rate / Enhanced Data Rate, Bluetooth BR/EDR, or just Bluetooth Classic.

The BIAS attack

The BIAS security flaw resides in how devices handle the link key, also known as a long-term key.

This key is generated when two Bluetooth devices pair (bond) for the first time. They agree on a long-term key, which they use to derive session keys for future connections without having to force device owners to go through the long-winded pairing process every time the Bluetooth devices need to communicate.

Researchers said they found a bug in this post-bonding authentication process. The flaw can allow an attacker to spoof the identity o a previously paired/bonded device and successfully authenticate and connect to another device without knowing the long-term pairing key that was previously established between the two.

Once a BIAS attack is successful, the attacker can then access or take control of another Bluetooth Classic device.

The research team said they tested the attack against a wide range of devices, including smartphones (iPhone, Samsung, Google, Nokia, LG, Motorola), tablets (iPad), laptops (MacBook, HP Lenovo), headphones (Philips, Sennheiser), and system-on-chip boards (Raspberry Pi, Cypress).

Image: Antonioli et. al

“At the time of writing, we were able to test [Bluetooth] chips from Cypress, Qualcomm, Apple, Intel, Samsung and CSR. All devices that we tested were vulnerable to the BIAS attack,” researchers said.

“Because this attack affects basically all devices that ‘speak Bluetooth,’ we performed a responsible disclosure with the Bluetooth Special Interest Group (Bluetooth SIG) – the standards organisation that oversees the development of Bluetooth standards – in December 2019 to ensure that workarounds could be put in place,” the team added.

In a press release published today, the Bluetooth SIG said they have updated the Bluetooth Core Specification to prevent BIAS attackers from downgrading the Bluetooth Classic protocol from a “secure” authentication method to a “legacy” authentication mode, where the BIAS attack is successful.

Vendors of Bluetooth devices are expected to roll out firmware updates in the coming months to fix the issue. The status and availability of these updates is currently unclear, even for the research team.


The academic team behind the BIAS attack includes Daniele Antonioli from the Swiss Federal Institute of Technology in Lausanne (EPFL), Kasper Rasmussen from the CISPA Helmholtz Center for Information Security in Germany, and Nils Ole Tippenhauer from the University of Oxford, thh UK.

They are the same team who discovered and disclosed the KNOB (Key Negotiation of Bluetooth) attack in the summer of 2019.

The research team said that if an attacker combines BIAS and KNOB, they can break the authentication even on Bluetooth Classic devices running in a secure authentication mode.

As such, Bluetooth-capable devices must receive patches against both the BIAS (CVE-2020-10135) and KNOB (CVE-2019-9506) attacks to be fully secure.

Additional details about the BIAS attack are available on the vulnerability’s official website or in a research paper titled “BIAS: Bluetooth Impersonation AttackS” [PDF].

About the author

E-Crypto News was developed to assist all cryptocurrency investors in developing profitable cryptocurrency portfolios through the provision of timely and much-needed information. Investments in cryptocurrency require a level of detail, sensitivity, and accuracy that isn’t required in any other market and as such, we’ve developed our databases to help fill in information gaps.

Related Posts

E-Crypto News Executive Interviews

Automated trading with HaasBot Crypto Trading Bots

Crypto Scams

Millions in Cryptocurrency Stolen by Scammers in the Last Month According to Tenable Research
November 24, 2021
Behind The Scenes: How this Crypto Community Responded to + $50m Hack
October 18, 2021
Crypto Scams
Crypto Scams Still Persistent In 2021, SEC Warns About Red Flags To Watch
September 9, 2021
Poly Network
Here’s How Hackers Stole Over $600 million in the Poly Network Attack
August 12, 2021
The World’s Most Infamous Crypto Hacks and Scams
July 31, 2021

Blockchain/Cryptocurrency Questions and Answers

Crypto casinos
How Does Bitcoin Casino Work + 2021 Beginner’s Guide
November 8, 2021
How to Buy and Sell Cryptocurrency
November 8, 2021
What Are Bitcoin Futures And How Will They Work In 2022?
November 4, 2021
The Unconventional Guide to Ethereum
October 28, 2021
ICo Presale
The Science Behind ICO Presales…
October 14, 2021

CryptoCurrencyUSDChange 1hChange 24hChange 7d
Bitcoin51,256 0.55 % 6.60 % 11.40 %
Ethereum4,409.6 1.33 % 9.27 % 0.79 %
Binance Coin587.09 0.05 % 6.81 % 5.89 %
Tether0.9986 0.03 % 0.08 % 0.23 %
Solana202.89 1.95 % 10.90 % 0.72 %
Cardano1.470 2.08 % 12.13 % 8.36 %
USD Coin1.000 0.14 % 0.20 % 0.17 %
XRP0.8374 0.84 % 7.95 % 15.53 %
Polkadot30.87 2.19 % 17.29 % 10.73 %
Terra68.86 0.75 % 9.18 % 33.50 %

Bitcoin (BTC) $ 50,972.00
Ethereum (ETH) $ 4,360.21
Binance Coin (BNB) $ 585.85
Tether (USDT) $ 0.998636
Solana (SOL) $ 200.26
Cardano (ADA) $ 1.44
USD Coin (USDC) $ 0.998668
XRP (XRP) $ 0.830677
Polkadot (DOT) $ 28.56
Terra (LUNA) $ 69.09