• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

BlueBorne attacks billions of devices, every device is vulnerable

{{postValue.id}}

blue

Every device contains bluetooth and those running on Android, iOS, Windows and even Linux is vulnerable to the new set of wireless vulnerabilities in Bluetooth settings called as BlueBorne.

A security company name Armis is the first one to find out all eight separate Bluetooth wireless protocol flaws. The Blueborne requires only a Bluetooth connection with the attacking device or even be in the discovery mode.

Armis CEO Yevgeny Dibrov explained: " These silent attacks are invisible to traditional security controls and procedures. Companies don' t monitor these types of device-to-device connections in their environment, so they can' t see these attacks or stop them."

Red Hat has classifies three out of eight vulnerabilities as critical. The compromised devices can be further used to attack nearby system over any segregated or air-gapped devices. These flaws impact almost 5.3 billion devices in all platforms.

Michael Parker, VP of marketing at Armis, used the WannaCry ransomware attack as an example. " You had WannaCry. Now imagine WannaCry ' Blue,' " said Parker. " It is ransomware that is spread through Bluetooth...It can spread from device to device, unnoticed by current security measures, locking down smartphones, desktops, laptops, and it can' t be stopped by traditional methods."

On Linux servers and desktops, it can attack via Logical Link Control and Adaptation Layer Protocol (L2CAP) at data link layer. This may affect only the Bluetooth hardware, not the Linux kernel with stack protection that will help stop the stack buffer overflow from leading to remote code execution.

Due to early detection of the flaws, Armis researchers warned Apple, Google, Linux and Microsoft corporation to immediately set a patch against this vulnerability.

The list of eight vulnerabilities are as follows:

  • Android information leak vulnerability &ndash CVE-2017-0785
  • Android RCE vulnerability #1 &ndash CVE-2017-0781
  • Android RCE vulnerability #2 &ndash CVE-2017-0782
  • The Bluetooth Pineapple in Android &ndash Logical Flaw CVE-2017-0783
  • Linux kernel RCE vulnerability &ndash CVE-2017-1000251
  • Linux Bluetooth stack (BlueZ) information Leak vulnerability &ndash CVE-2017-1000250
  • The Bluetooth Pineapple in Windows &ndash Logical Flaw CVE-2017-8628
  • Apple Low Energy Audio Protocol RCE vulnerability (no designated CVE number yet)

While the fixes are being done in every platform, do your own steps to protect against this threat- disable Bluetooth on all your devices.

Tags:
ethan
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 5 )

Q

What are BlueBorne attacks?

A

Every device contains Bluetooth and those running on Android, iOS, Windows and even Linux is vulnerable to the new set of wireless vulnerabilities in Bluetooth settings called as BlueBorne.

Q

How many vulnerabilities can affect Linux?

A

Red Hat has classified three out of eight vulnerabilities as critical. The compromised devices can be further used to attack nearby system over any segregated or air-gapped devices.

Q

What attack will happen by BlueBorne on Linux servers?

A

On Linux servers and desktops, it can attack via Logical Link Control and Adaptation Layer Protocol (L2CAP) at data link layer. This may affect only the Bluetooth hardware, not the Linux kernel with stack protection that will help stop the stack buffer overflow from leading to remote code execution.

Q

Who found out the answers dor Bluetooth flaws?

A

A security company name Armis is the first one to find out all eight separate Bluetooth wireless protocol flaws. The Blueborne requires only a Bluetooth connection with the attacking device or even be in the discovery mode.

Q

What will happen actually in BlueBorne?

A

These silent attacks are invisible to traditional security controls and procedures. Companies don' t monitor these types of device-to-device connections in their environment, so they can' t see these attacks or stop them.

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Jayce ?
What are the types of table used in IPtables

What are the various types of table used in IPtables and how to use that for my server security?

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.