Published in Mobiles

Bluetooth Low-Energy (BLE) chips have killer vulnerablity

by on02 November 2018


Bleeding Bit hits Cisco, Meraki, and Aruba wireless access points

Two new zero-day vulnerabilities called "Bleeding Bit" have been revealed by security firm Armis, impacting Bluetooth Low-Energy (BLE) chips used in millions of Cisco, Meraki, and Aruba wireless access points (APs).

Developed by Texas Instruments (TI), the vulnerable BLE chips are used by roughly 70 to 80 per cent of business wireless access points today by way of Cisco, Meraki and Aruba products.

The first vulnerability, CVE-2018-16986, impacts Cisco and Meraki APs using TI BLE chips. Attacks can remotely send multiple benign BLE broadcast messages, called "advertising packets, which are stored on the memory of the vulnerable chip.

As long as a target device's BLE is turned on, these packets -- which contain hidden malicious code to be invoked later on -- can be used together with an overflow packet to trigger an overflow of critical memory. If exploited, attackers can trigger memory corruption in the chip's BLE stack, creating a scenario in which the threat actor can access an operating system and hijack devices, create a backdoor, and remotely execute malicious code.

The second vulnerability, CVE-2018-7080, is present in the over-the-air firmware download (OAD) feature of TI chips used in Aruba Wi-Fi access point Series 300 systems. The vulnerability is technically a leftover development backdoor tool.

This oversight, the failure to remove such a powerful development tool, could permit attackers to compromise the system by gaining a foothold into a vulnerable access point. "It allows an attacker to access and install a completely new and different version of the firmware -- effectively rewriting the operating system of the device," the company says. "The OAD feature doesn't offer a security mechanism that differentiates a "good" or trusted firmware update from a potentially malicious update."

Last modified on 02 November 2018
Rate this item
(0 votes)