BlueBorne
What is BlueBorne?
BlueBorneA 2017 set of Bluetooth vulnerabilities discovered by Armis that allowed remote code execution and man-in-the-middle attacks on Android, iOS, Linux, and Windows.
BlueBorne is a family of eight Bluetooth vulnerabilities disclosed by security firm Armis in September 2017. The flaws affected Bluetooth implementations on Android, iOS, Linux, and Windows, and could be exploited without pairing or user interaction as long as Bluetooth was enabled. The most severe issues included CVE-2017-0781 and CVE-2017-0782 in Android, CVE-2017-1000251 in the Linux BlueZ kernel stack, and CVE-2017-8628 in Windows. Armis estimated more than 5.3 billion devices were initially exposed. Patches from Google, Microsoft, Linux distributions, and Apple followed in 2017, but countless unpatched IoT and embedded devices remained vulnerable for years, making BlueBorne a milestone in proximity-based wireless attack research.
● Examples
- 01
September 2017 Armis disclosure of eight Bluetooth flaws affecting 5.3+ billion devices.
- 02
Exploitation of CVE-2017-1000251 in the Linux BlueZ stack to gain kernel code execution.
● Frequently asked questions
What is BlueBorne?
A 2017 set of Bluetooth vulnerabilities discovered by Armis that allowed remote code execution and man-in-the-middle attacks on Android, iOS, Linux, and Windows. It belongs to the Attacks & Threats category of cybersecurity.
What does BlueBorne mean?
A 2017 set of Bluetooth vulnerabilities discovered by Armis that allowed remote code execution and man-in-the-middle attacks on Android, iOS, Linux, and Windows.
How does BlueBorne work?
BlueBorne is a family of eight Bluetooth vulnerabilities disclosed by security firm Armis in September 2017. The flaws affected Bluetooth implementations on Android, iOS, Linux, and Windows, and could be exploited without pairing or user interaction as long as Bluetooth was enabled. The most severe issues included CVE-2017-0781 and CVE-2017-0782 in Android, CVE-2017-1000251 in the Linux BlueZ kernel stack, and CVE-2017-8628 in Windows. Armis estimated more than 5.3 billion devices were initially exposed. Patches from Google, Microsoft, Linux distributions, and Apple followed in 2017, but countless unpatched IoT and embedded devices remained vulnerable for years, making BlueBorne a milestone in proximity-based wireless attack research.
How do you defend against BlueBorne?
Defences for BlueBorne typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for BlueBorne?
Common alternative names include: BlueBorne attack vector.
● Related terms
- attacks№ 102
BleedingTooth
A 2020 set of Linux BlueZ Bluetooth vulnerabilities, headlined by CVE-2020-12351, that permitted zero-click remote code execution on vulnerable Linux hosts.
- attacks№ 121
BrakTooth
A 2021 family of 16+ Bluetooth Classic vulnerabilities in commercial SoCs disclosed by researchers at the Singapore University of Technology and Design.
- ot-iot№ 552
IoT Security
The discipline of protecting Internet-of-Things devices, gateways, networks, and cloud services from compromise, given their scale, constrained resources, and long lifetimes.
● See also
- № 591KNOB Attack
- № 094BIAS Attack