Bluetooth Vulnerabilities in Android, MacOS, iOS, Linux let attackers inject data - Thyrasec
Researchers have found new Bluetooth vulnerabilities in Bluetooth HID allowing attackers to inject keystrokes
Android – Vulnerable if Bluetooth is enabled. Allows injecting keystrokes
Reports are periodic messages with a specific format that are transmitted by an HID device and processed by the host.
Input HID reports include input data like keyboard keypress and mice movements / button clicks
. Bluetooth Logical Link Control and Adaptation Protocol (L2CAP
and it’s the entry point to send data to the system.
L2CAP Channel 0x0013 (19) – HID Interrupt which allows sending input and output reports with low latency
The key here is that if we are able to send packets with the right format to the HID control and interrupt channels, that means we are acting as if we’re a keyboard or mouse.
the keyboard can start the connection and pairing process. That’s normally not an issue but it seems that in many cases the authentication process can be bypassed altogether.
Now, the key in getting this to work is that the keyboard can specify certain settings that allow it to not require authentication. These are certain fields in the connection packets .
That is, only peripherals that were previously paired can reconnect this way. The way this is done is by identifying devices by their Bluetooth address