Article Details
Scrape Timestamp (UTC): 2023-12-06 20:50:23.481
Source: https://www.theregister.com/2023/12/06/bluetooth_bug_apple_linux/
Original Article Text
Click to Toggle View
Apple and some Linux distros are open to Bluetooth attack. Issue has been around since at least 2012. A years-old Bluetooth authentication bypass vulnerability allows miscreants to connect to Apple, Android and Linux devices and inject keystrokes to run arbitrary commands, according to a software engineer at drone technology firm SkySafe. The bug, tracked as CVE-2023-45866, doesn't require any special hardware to exploit, and the attack can be pulled off from a Linux machine using a regular Bluetooth adapter, says Marc Newlin, who found the flaw and reported it to Apple, Google, Canonical, and Bluetooth SIG. Newlin says he'll provide vulnerability details and proof-of-concept code at an upcoming conference but wants to hold off until everything is patched. The attack allows a nearby intruder to inject keystrokes and execute malicious actions on victims' devices, as long as they don't require a password or biometric authentication. In a GitHub post published on Wednesday, the bug hunter describes the security flaw thus: "The vulnerabilities work by tricking the Bluetooth host state-machine into pairing with a fake keyboard without user-confirmation. The underlying unauthenticated pairing mechanism is defined in the Bluetooth specification, and implementation-specific bugs expose it to the attacker." Regulars readers may remember Newlin from a similar set of Bluetooth flaws he uncovered in 2016. These, dubbed MouseJack, exploited keystroke-injection vulnerabilities in wireless mice and keyboards from 17 different vendors. CVE-2023-45866, however, is even older than MouseJack. Newlin says he tested a BLU DASH 3.5 running Android 4.2.2, which was released in 2012, and found it vulnerable to the flaw. In fact, there is no fix for Android 4.2.2-10 issue. Google issued the following statement to Newlin: "Fixes for these issues that affect Android 11 through 14 are available to impacted OEMs. All currently-supported Pixel devices will receive this fix via December OTA updates." Here's the details published in the Android security bulletin, with the flaw rated high severity. While the issue was fixed in Linux in 2020, Newlin says ChromeOS is the only Linux-based operating system that enabled the fix. Other Linux distros including Ubuntu, Debian, Fedora, Gentoo, Arch and Alpine left it disabled by default. Ubuntu 18.04, 20.04, 22.04, 23.10 remain vulnerable, we're told. This patch mitigates the flaw in BlueZ. The bug also affects macOS and iOS when Bluetooth is enabled and a Magic Keyboard has been paired with the vulnerable phone or computer. Critically, it works in Apple's LockDown mode, which the vendor claims can protect devices against sophisticated attacks. Newlin disclosed the issue to Apple back in August. He told The Register that Apple did confirm his report, but hasn't shared a patch timeline for the vulnerability. Apple did not respond to The Register's inquiries.
Daily Brief Summary
A Bluetooth authentication bypass vulnerability, identified as CVE-2023-45866, allows unauthorized keystroke injection into Apple, Android, and Linux devices.
Discovered by Marc Newlin of SkySafe, the flaw requires no special hardware for exploitation and can be executed from a standard Linux machine.
Details of the vulnerability and a proof-of-concept will be released by Newlin after patches have been fully implemented.
This vulnerability is particularly alarming as it can bypass authentication methods on devices and execute arbitrary commands without the user's knowledge.
The issue, which dates back to at least 2012, affects a range of systems from old Android versions to contemporary macOS and iOS devices when paired with a Magic Keyboard.
Google has responded by providing fixes for Android 11 through 14, with Pixel devices receiving updates in December.
Linux distributions, with the exception of ChromeOS, have left the necessary patch disabled by default, leaving many systems including Ubuntu, Debian, Fedora, Gentoo, Arch, and Alpine at risk.
Apple confirmed the vulnerability but has yet to provide a timeline for patching the issue, and did not comment further on inquiries from The Register.