logo
#

Latest news with #Airoha

Bluetooth audio devices from top brands can be spied on, warns CERT-In
Bluetooth audio devices from top brands can be spied on, warns CERT-In

Hindustan Times

timea day ago

  • Hindustan Times

Bluetooth audio devices from top brands can be spied on, warns CERT-In

India's cybersecurity agency, the Indian Computer Emergency Response Team (CERT-In), has issued a high-severity warning for users of Bluetooth audio devices. The agency said that multiple vulnerabilities have been reported in Airoha Bluetooth firmware.(Pixabay) The agency said that multiple vulnerabilities have been reported in Airoha Bluetooth firmware, which could allow attackers to gain unauthorised access to Bluetooth audio devices such as the Sony WH-1000XM5, JBL Live Buds 3, Bose QuietComfort Earbuds, and Marshall Motif II. 'The vulnerabilities exist in Airoha Systems-on-Chip (SoCs) due to missing authentication in the GATT service and the Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) component, as well as a flaw in a custom protocol,' CERT-In said in the warning issued on July 2. 'An attacker could exploit these vulnerabilities by establishing connections between mobile devices and audio Bluetooth devices and by delivering commands via the Bluetooth Hands-Free Profile (HFP),' it added. It warned that attackers could potentially eavesdrop or manipulate audio communications and intercept or inject commands on the targeted system. CERT-In said that Airoha has supplied an update containing firmware fixes to all device manufacturers on 4 June 2025. 'Each vendor is expected to release product-specific firmware updates in its next scheduled cycle,' it said. According to a Business Standard report, Airoha is a leading supplier of Bluetooth audio chipsets (SoCs), commonly used in True Wireless Stereo (TWS) earbuds and other audio equipment manufactured by top brands like Sony and JBL. Which devices are affected? German cybersecurity firm Enno Rey Netzwerke GmbH (ERNW) said that 29 audio products across 10 brands are impacted. The brands include Bose, Sony, JBL, Jabra, Marshall, Beyerdynamic, JLab, EarisMax, MoerLabs, and Teufel. The affected devices range from wireless headphones and earbuds to microphones and speakers. Some of the models confirmed vulnerable include Beyerdynamic Amiron 300, Bose QuietComfort Earbuds, EarisMax Bluetooth Auracast Sender, Jabra Elite 8 Active, JBL Endurance Race 2, JBL Live Buds 3, Jlab Epic Air Sport ANC, Marshall ACTON III, Marshall MAJOR V, Marshall MINOR IV, Marshall MOTIF II, Marshall STANMORE III, Marshall WOBURN III, MoerLabs EchoBeatz, Sony CH-720N, Sony Link Buds S, Sony ULT Wear, Sony WF-1000XM3, Sony WF-1000XM4, Sony WF-1000XM5, Sony WF-C500, Sony WF-C510-GFP, Sony WH-1000XM4, Sony WH-1000XM5, Sony WH-1000XM6, Sony WH-CH520, Sony WH-XB910N, Sony WI-C100, Teufel Tatws2.

Sony And Bose Bluetooth Headphone Security Risk: Indian Govt Raises Major Alert For Millions
Sony And Bose Bluetooth Headphone Security Risk: Indian Govt Raises Major Alert For Millions

News18

timea day ago

  • News18

Sony And Bose Bluetooth Headphone Security Risk: Indian Govt Raises Major Alert For Millions

Last Updated: Bluetooth headphones and speakers from popular brands like Bose, Sony and Marshall are at a big risk of getting hacked. Use a Bluetooth headphone or earbuds? The Indian government has raised a major security warning related to the drivers that power these devices. Brands like Bose, Jabra, Sony and Marshall are some of the big names that are affected by this major risk that is linked to Airoha SoC that companies use to power their headphones and other audio products. The alert comes via the Indian Computer Emergency Response Team or CERT-In with a high severity rating which demands immediate attention of millions who use headphones or TWS earbuds from these brands. Bluetooth Security Risk: What Is The Issue? The Airoha Bluetooth firmware is the actual victim of the vulnerability but the hardware is powering millions of wireless audio products available in the market. 'Multiple vulnerabilities have been reported in Airoha Bluetooth firmware, which could allow an attacker within Bluetooth range to read or write device RAM/flash, invoke Hands-Free Profile (HFP) commands on a paired phone, eavesdrop on microphone audio, steal call history and contacts, and potentially deploy wormable firmware," the CERT-In bulletin notifies. In simple words, if an attacker is able to bypass the issue, they can access any device connected to the affected headphones, listen to the conversations and even get hold of data like call history and contacts. Airoha is well aware of the security vulnerability in its hardware and the company has already offered an SDK update with the firmware to secure all the devices. 'Airoha supplied an SDK update containing firmware fixes to all device manufacturers on 4 June 2025, and each vendor is expected to release product-specific firmware updates in its next scheduled cycle," the note adds. Security risks are quite common these days with the advent of phones, laptops and other smart devices. Bluetooth headphones have become the latest target and issues like this invariably put millions at risk. Experts quoted in this report, have pointed out that the security issues can be only exploited if the attacker is in the Bluetooth range with the speaker, TWS earbuds or headphones. And they need high-level expertise to really extract the details through these devices. We are hoping that manufacturers issue their latest patch to fix these issues and risks at the earliest. First Published: July 04, 2025, 07:30 IST

You might be spied on through your bluetooth audio devices, CERT-In warns
You might be spied on through your bluetooth audio devices, CERT-In warns

Business Standard

time2 days ago

  • Business Standard

You might be spied on through your bluetooth audio devices, CERT-In warns

The Indian Computer Emergency Response Team (CERT-In) has issued a high-severity warning for Bluetooth TWS earbuds, speakers, and headphone users. In a recent alert, CERT-In said that Bluetooth audio devices powered by Airoha systems-on-chip (SoCs) are exposed to the risk of getting hacked and being turned into spying devices. As per the CERT-In advisory, by exploiting this vulnerability, attackers can hijack calls, spy on conversations happening nearby bluetooth devices, steal call history and contacts, and might also be able to completely take over the affected device. For the unaware, Airoha is a major supplier of Bluetooth audio chipsets (SoCs), widely used in True Wireless Stereo (TWS) earbuds and other audio devices by leading brands including Sony and JBL. Vulnerable devices Researchers from German cybersecurity firm ERNW have identified three critical vulnerabilities in Airoha chipsets. Their findings reveal that 29 audio products across 10 brands, including Bose, Sony, JBL, Jabra, Marshall, Beyerdynamic, JLab, EarisMax, MoerLabs, and Teufel, are impacted. The affected devices range from wireless headphones and earbuds to microphones and speakers. As per the German cybersecurity firm, these devices were confirmed to be vulnerable: Beyerdynamic Amiron 300 Bose QuietComfort Earbuds EarisMax Bluetooth Auracast Sender Jabra Elite 8 Active JBL Endurance Race 2 JBL Live Buds 3 Jlab Epic Air Sport ANC Marshall ACTON III Marshall MAJOR V Marshall MINOR IV Marshall MOTIF II Marshall STANMORE III Marshall WOBURN III MoerLabs EchoBeatz Sony CH-720N Sony Link Buds S Sony ULT Wear Sony WF-1000XM3 Sony WF-1000XM4 Sony WF-1000XM5 Sony WF-C500 Sony WF-C510-GFP Sony WH-1000XM4 Sony WH-1000XM5 Sony WH-1000XM6 Sony WH-CH520 Sony WH-XB910N Sony WI-C100 Teufel Tatws2 What risk does the vulnerability pose and what's the solution As per CERT-In, multiple vulnerabilities have been reported in Airoha bluetooth firmware, which could allow an attacker within Bluetooth range to read or write device RAM/flash, invoke hands-free profile (HFP) commands on a paired phone, eavesdrop on microphone audio, steal call history and contacts, and potentially deploy wormable firmware. Airoha has supplied an SDK update containing firmware fixes to all device manufacturers on June 4, CERT-In said. Each company is expected to release product specific firmware updates in their due time. Consumers can keep checking for the updates and install it as soon as it gets released to safeguard themselves against this vulnerability. In related news, earlier in June, CERT-In issued a security advisory for Google Chrome users on Windows, macOS, Linux, and older Android versions. According to the alert, vulnerabilities in these platforms could be exploited by attackers to gain unauthorised access to sensitive data, escalate privileges, or trigger denial-of-service attacks. The warning applies to all smartphones running the affected Android versions, regardless of the manufacturer. Users can safeguard themselves by updating Google Chrome to the latest version immediately.

Sony, JBL, Bose BT headphones hit by major security flaw: 100+ models affected
Sony, JBL, Bose BT headphones hit by major security flaw: 100+ models affected

Mint

time4 days ago

  • Mint

Sony, JBL, Bose BT headphones hit by major security flaw: 100+ models affected

A serious security flaw has been found in Bluetooth headphones and earbuds using chips from Taiwanese manufacturer Airoha, exposing millions of users to potential privacy threats. The vulnerability affects popular models from Sony, JBL, Bose, Jabra, Marshall, and others, allowing hackers to hijack audio devices without the need for pairing or authentication. No pairing required for attack Discovered by German cybersecurity firm Enno Rey Netzwerke GmbH (ERNW), the flaw lies in Airoha's Bluetooth System-on-a-Chip (SoC), widely used in wireless audio products. According to ERNW, 'The vulnerabilities can be triggered via Bluetooth BR/EDR or Bluetooth Low Energy (BLE). Being in Bluetooth range is the only precondition.' Attackers just need to be within 10 meters of the device to hack it. Once in range, they can access RAM and flash memory, view currently playing media, extract contact details and even initiate phone calls using the hijacked headphones as a bridge. In some cases, the vulnerability could be used to convert earphones into makeshift microphones, raising concerns over potential surveillance. Over 100 models are likely affected Confirmed affected devices include premium models such as the Sony WH-1000XM6, Bose QuietComfort Earbuds, JBL Live Buds 3, Jabra Elite 8 Active, and several products from Marshall. ERNW estimates that over 100 models may be vulnerable, as many brands unknowingly use Airoha chips through third-party sourcing. At the Troopers conference in Heidelberg, researchers revealed three vulnerabilities, one critical and two high-risk. The flaws could expose phone numbers, reveal call data or allow attackers to manipulate trust relationships between headphones and connected smartphones. ERNW released a list of devices that are confirmed to be vulnerable: Beyerdynamic Amiron 300 Bose QuietComfort Earbuds EarisMax Bluetooth Auracast Sender Jabra Elite 8 Active JBL Endurance Race 2 JBL Live Buds 3 Jlab Epic Air Sport ANC Marshall ACTON III Marshall MAJOR V Marshall MINOR IV Marshall MOTIF II Marshall STANMORE III Marshall WOBURN III MoerLabs EchoBeatz Sony CH-720N Sony Link Buds S Sony ULT Wear Sony WF-1000XM3 Sony WF-1000XM4 Sony WF-1000XM5 Sony WF-C500 Sony WF-C510-GFP Sony WH-1000XM4 Sony WH-1000XM5 Sony WH-1000XM6 Sony WH-CH520 Sony WH-XB910N Sony WI-C100 Teufel Tatws2 Please note that these are the confirmed devices that have been exposed to a hijacking threat. Researchers say there could be more. Fix released, but no firmware updates yet Airoha released a patched Software Development Kit (SDK) to manufacturers on June 4. However, as of now, no firmware updates have reached consumers. ERNW urges users to regularly check brand apps for updates or contact support directly. Although the flaws are technically complex and require close physical proximity, ERNW advises heightened caution for high-risk users such as journalists, diplomats and government personnel. For everyday users, the immediate threat remains comparatively lower. In the meantime, experts recommend turning off Bluetooth in public spaces or switching to wired alternatives for added security.

Major security flaw exposes Sony, JBL and Bose headphones to hijacking threat — how to stay safe
Major security flaw exposes Sony, JBL and Bose headphones to hijacking threat — how to stay safe

Tom's Guide

time5 days ago

  • Tom's Guide

Major security flaw exposes Sony, JBL and Bose headphones to hijacking threat — how to stay safe

Researchers have discovered a security flaw in Bluetooth headphones and earbuds from Sony, JBL and more, allowing attackers to hijack audio devices, eavesdrop and steal phone numbers and contact information. Cybersecurity firm ERNW identified vulnerabilities in audio products using a Bluetooth System on a Chip (SoC) from manufacturer and supplier Airoha, allowing threat actors to manipulate devices without needing to pair with them. This SoC is used among many popular brands, with affected devices confirmed to include the Sony WH-1000XM6, Link Buds S, Jabra Elite 8 Active, Bose QuietComfort Earbuds and more. As noted in the report, the vulnerabilities allow cybercriminals to hijack headphones over Bluetooth, with BLE GATT services and BD/EDR (a.k.a. Bluetooth Classic) missing authentication and leaving these devices open to be taken over without any need for pairing or authentication. "The vulnerabilities can be triggered via Bluetooth BR/EDR or Bluetooth Low Energy (BLE). Being in Bluetooth range is the only precondition," ERNW reports. "It is possible to read and write the device's RAM and flash. These capabilities also allow attackers to hijack established trust relationships with other devices, such as the phone paired to the headphones." The security flaws can lead to threat actors knowing what is currently playing on devices via RAM reading commands, eavesdropping on conversations when the Bluetooth Classic vulnerability is exploited and being able to see a connected device's phone number and incoming calls. It's important to note that these vulnerabilities can only be exploited if an attacker is within Bluetooth range of a device (around 10 meters), and requires several steps to achieve hijacking without being noticed — with ERNW noting that it would take a "high technical skill set." Get instant access to breaking news, the hottest reviews, great deals and helpful tips. So, while it's possible for cybercriminals to take advantage of these flaws in headphones or earbuds using Airoha Bluetooth SoCs (especially if they're wireless), they would need to be in close range. While many audio products, including headphones, earbuds, speakers and wireless microphones, are known to use Airoha's Bluetooth chip, the cybersecurity firm has confirmed a list of devices that are affected. Here's a look at the devices that are exposed to the vulnerability: However, it's expected that many more audio devices with the SoC are also exposed to the security flaw, but it's virtually impossible to test them all with the amount out there. ERNW states that "some vendors are not even aware that they are using an Airoha SoC," due to parts like the Bluetooth chip being outsourced for development. Since these headphones, earbuds and more are from popular brands, including the latest Sony WH-1000XM6, it's likely that many people are at risk of the vulnerability. While many of the best headphones and best wireless earbuds are affected, an attack that exploits these security flaws would only take place if a cybercriminal is in range. So, as with any Bluetooth attack, it's a good idea to be cautious when in public spaces, such as public transport, cafés and more. The only real way to stay safe from these types of attacks is to disable Bluetooth, which isn't ideal for wireless headphones and earbuds. Of course, it's also best to use wired options that don't require Bluetooth, such as the Sennheiser IE 200 wired earbuds. As this leaves many audio products open to attack, Airoha has now fixed the vulnerabilities in a Software Development Kit (SDK). A new version with the fixes has been sent to manufacturers as of the first week of June, meaning brands such as Sony, JBL, Marshall and others should have a firmware update available with the fixes so users can update their devices with the latest patch. Currently, ERNW isn't aware of any fixed firmware releases, but as soon as one is available, users with affected devices should update their headphones, earbuds and more to make sure they aren't at risk. To keep yourself safe from any online threats that these security vulnerabilities may exploit, it's best to use the best antivirus software and best password managers, too.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store