We detect you are using an unsupported browser. For the best experience, please visit the site using Chrome, Firefox, Safari, or Edge. X
Maximize Your Experience: Reap the Personalized Advantages by Completing Your Profile to Its Fullest! Update Here
Stay in the loop with the latest from Microchip! Update your profile while you are at it. Update Here
Complete your profile to access more resources.Update Here!
0
$0.00
Item Qty
Your cart is empty.

BlueBorne is a recently published attack vector that exploits security gaps in Bluetooth classic connections and can be used to execute malicious code on affected devices. More details about the specific vulnerabilities can be found below.

Products That Have No Vulnerabilities


  • IS200x
  • IS201x
  • S202x
  • IS206x
  • IS208x
  • IS167x
  • IS187x
  • BM2x
  • BM6x
  • BM7x
  • RN487x
  • RN467x
  • ATSAMB11
  • ATBTLC1000
  • RN42
  • RN4020
  • RN41
 
 
 

Products That Require Customer Attention


The BlueBorne attack vectors exploits security gaps in the host Bluetooth stack implementation and is not related in any way to the ATWILC3000 firmware or driver implementation.

Recommended Actions


  1. The recommended fix is to patch the Host layers that the attack is using
  2. On the host BT stack ensuring the device remains in IDLE state by not enabling Page/ Inquiry scan at any time and that it will never initiate any Bluetooth connection setting the device into Page/ Inquiry states.
  3. New firmware release is planned (15.01) that will disable Bluetooth classic operation and will ensure these vulnerabilities can’t be exploited – Estimated date 01/2018.

Detailed Description


BlueBorne targets vulnerabilities in Android and Linux BlueDroid and BlueZ stack implementation which allow Remote Code Execution (RCE) on the host within high privileged process and/or kernel space. The BlueBorne attack vector exploits the following eight vulnerabilities in the host Bluetooth stack implementation and is not related in any way to the Microchip Bluetooth device firmware or driver implementation.

Vulnerabilities Indentified


  1. Linux kernel RCE vulnerability – CVE-2017-1000251
  2. Linux Bluetooth stack (BlueZ) information Leak vulnerability – CVE-2017-1000250
  3. Android information Leak vulnerability – CVE-2017-0785
  4. Android RCE vulnerability #1 – CVE-2017-0781
  5. Android RCE vulnerability #2 – CVE-2017-0782
  6. The Bluetooth Pineapple in Android – Logical Flaw CVE-2017-0783
  7. The Bluetooth Pineapple in Windows – Logical Flaw CVE-2017-8628
  8. Apple Low Energy Audio Protocol RCE vulnerability – CVE-2017-14315

Recommended Actions


  1. The correct and recommended fix for this attack is to patch the Host layers that the attack targets.
  2. Security Management Protocol (SMP): The exposed services can limit access to its features to fully paired devices (Authenticated), ‘Just Works’ mode is essential for devices with no IO capabilities but it marks the connected device to be unauthenticated so that access to unintended services will be prohibited. Service implementer should be aware of access permissions of different features.

For more information visit the Blueborne website.