Critical flaw lets hackers track, eavesdrop via Bluetooth audio devices
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读用户提供的文章内容。 这篇文章主要讲的是Google的Fast Pair协议被发现了一个严重漏洞,叫做WhisperPair。这个漏洞影响了数亿无线耳机、耳塞和扬声器,这些设备来自多个制造商,并且支持Fast Pair功能。攻击者可以利用这个漏洞劫持蓝牙音频设备,跟踪用户,窃听他们的对话。 接下来,我需要提取关键信息:漏洞名称、影响范围、攻击者的能力、受影响的设备类型、制造商名单、Google的应对措施以及用户的防御方法。 然后,我要把这些信息浓缩成一段简短的文字,确保不超过100个字。要注意用词简洁明了,同时涵盖所有重要点。 最后,检查一下是否符合用户的要求:没有使用特定的开头词,内容准确且在字数限制内。 </think> Google的Fast Pair协议被发现严重漏洞(CVE-2025-36911),允许攻击者劫持蓝牙音频设备并窃听用户对话。该漏洞影响数亿无线耳机和音箱等设备,涉及Google、Jabra等品牌。攻击者可利用此漏洞在14米内快速配对并控制设备。Google已提供补丁修复漏洞,建议用户安装最新固件更新以防御风险。 2026-1-15 16:15:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Headphones

Security researchers have discovered a critical vulnerability in Google's Fast Pair protocol that can allow attackers to hijack Bluetooth audio accessories, track users, and eavesdrop on their conversations.

The flaw (tracked as CVE-2025-36911 and dubbed WhisperPair) affects hundreds of millions of wireless headphones, earbuds, and speakers from multiple manufacturers that support Google's Fast Pair feature. It affects users regardless of their smartphone operating system because the flaw lies in the accessories themselves, meaning that iPhone users with vulnerable Bluetooth devices are equally at risk.

Researchers with KU Leuven's Computer Security and Industrial Cryptography group who discovered it explain that the vulnerability stems from the improper implementation of the Fast Pair protocol in many flagship audio accessories.

Wiz

Although the Fast Pair specification says that Bluetooth devices should ignore pairing requests when not in pairing mode, many vendors have not enforced this check in their products, allowing unauthorized devices to initiate pairing without the user's consent or knowledge.

"To start the Fast Pair procedure, a Seeker (a phone) sends a message to the Provider (an accessory) indicating that it wants to pair. The Fast Pair specification states that if the accessory is not in pairing mode, it should disregard such messages," the researchers said.

"However, many devices fail to enforce this check in practice, allowing unauthorised devices to start the pairing process. After receiving a reply from the vulnerable device, an attacker can finish the Fast Pair procedure by establishing a regular Bluetooth pairing."

Attackers can exploit the WhisperPair flaw using any Bluetooth-capable device (such as a laptop, a Raspberry Pi, or even a phone) to forcibly pair with vulnerable accessories from Google, Jabra, JBL, Logitech, Marshall, Nothing, OnePlus, Sony, Soundcore, and Xiaomi at ranges up to 14 meters within seconds and without user interaction or physical access.

After pairing, they gain complete control over the audio device, enabling them to blast audio at high volumes or eavesdrop on users' conversations through the device's microphone.

CVE-2025-36911 also allows attackers to track their victims' location using Google's Find Hub network if the accessory has never been paired with an Android device by adding the device to their own Google account.

"The victim may see an unwanted tracking notification after several hours or days, but this notification will show their own device," they added. "This may lead users to dismiss the warning as a bug, enabling an attacker to keep tracking the victim for an extended period."

Google awarded the researchers $15,000, the maximum possible bounty, and worked with manufacturers to release security patches during a 150-day disclosure window. However, they noted that security updates addressing this flaw may not yet be available for all vulnerable devices.

The only defense against attackers hijacking vulnerable Fast Pair-enabled Bluetooth accessories is installing firmware updates from device manufacturers. Disabling Fast Pair on Android phones does not prevent the attack, as the feature cannot be disabled on the accessories themselves.

Wiz

The 2026 CISO Budget Benchmark

It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

Learn how top leaders are turning investment into measurable impact.


文章来源: https://www.bleepingcomputer.com/news/security/critical-flaw-lets-hackers-track-eavesdrop-via-bluetooth-audio-devices/
如有侵权请联系:admin#unsafe.sh