Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 111

BlueBorne

What is BlueBorne?

BlueBorneA 2017 set of Bluetooth vulnerabilities discovered by Armis that allowed remote code execution and man-in-the-middle attacks on Android, iOS, Linux, and Windows.


BlueBorne is a family of eight Bluetooth vulnerabilities disclosed by security firm Armis in September 2017. The flaws affected Bluetooth implementations on Android, iOS, Linux, and Windows, and could be exploited without pairing or user interaction as long as Bluetooth was enabled. The most severe issues included CVE-2017-0781 and CVE-2017-0782 in Android, CVE-2017-1000251 in the Linux BlueZ kernel stack, and CVE-2017-8628 in Windows. Armis estimated more than 5.3 billion devices were initially exposed. Patches from Google, Microsoft, Linux distributions, and Apple followed in 2017, but countless unpatched IoT and embedded devices remained vulnerable for years, making BlueBorne a milestone in proximity-based wireless attack research.

Examples

  1. 01

    September 2017 Armis disclosure of eight Bluetooth flaws affecting 5.3+ billion devices.

  2. 02

    Exploitation of CVE-2017-1000251 in the Linux BlueZ stack to gain kernel code execution.

Frequently asked questions

What is BlueBorne?

A 2017 set of Bluetooth vulnerabilities discovered by Armis that allowed remote code execution and man-in-the-middle attacks on Android, iOS, Linux, and Windows. It belongs to the Attacks & Threats category of cybersecurity.

What does BlueBorne mean?

A 2017 set of Bluetooth vulnerabilities discovered by Armis that allowed remote code execution and man-in-the-middle attacks on Android, iOS, Linux, and Windows.

How does BlueBorne work?

BlueBorne is a family of eight Bluetooth vulnerabilities disclosed by security firm Armis in September 2017. The flaws affected Bluetooth implementations on Android, iOS, Linux, and Windows, and could be exploited without pairing or user interaction as long as Bluetooth was enabled. The most severe issues included CVE-2017-0781 and CVE-2017-0782 in Android, CVE-2017-1000251 in the Linux BlueZ kernel stack, and CVE-2017-8628 in Windows. Armis estimated more than 5.3 billion devices were initially exposed. Patches from Google, Microsoft, Linux distributions, and Apple followed in 2017, but countless unpatched IoT and embedded devices remained vulnerable for years, making BlueBorne a milestone in proximity-based wireless attack research.

How do you defend against BlueBorne?

Defences for BlueBorne typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for BlueBorne?

Common alternative names include: BlueBorne attack vector.

Related terms

See also