耳机劫持:蓝牙耳机中的Airoha RACE关键漏洞可被用于劫持智能手机
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容,理解主要信息。 文章讲的是蓝牙耳机里的芯片存在三个关键漏洞,这些漏洞可以让攻击者窃听对话甚至接管连接的手机。受影响的品牌包括索尼、JBL、Marshall和Jabra等。攻击者可以利用这些漏洞获取蓝牙链接密钥,进而控制手机,执行各种恶意操作。 接下来,我需要将这些信息浓缩到100字以内。要确保涵盖主要点:漏洞的存在、影响的品牌、攻击者的可能行为以及建议的应对措施。 可能的结构是:先说明问题(蓝牙耳机芯片漏洞),然后描述影响(被攻击者窃听和接管手机),最后提到受影响的品牌和建议使用有线耳机。 现在,组织语言:确保简洁明了,避免重复。比如,“关键漏洞”、“窃听对话”、“接管手机”、“知名品牌”、“建议使用有线耳机”。 检查字数是否在限制内。可能需要调整用词,使其更紧凑。 最终总结应该清晰传达主要风险和建议措施。 </think> 蓝牙耳机芯片存在关键漏洞,允许攻击者窃听对话并接管连接的手机。这些漏洞影响索尼、JBL、Marshall等品牌的设备,可能导致隐私泄露和设备被操控。专家建议用户更新固件或改用有线耳机以降低风险。 2025-12-29 00:29:34 Author: securityonline.info(查看原文) 阅读量:0 收藏

SmarterMail RCE, CVE-2025-52691 Airoha RACE, Headphone Jacking HPE OneView RCE CVE-2025-37164 FreePBX Auth Bypass, PBX Takeover ScreenConnect Config Flaw, Untrusted Extensions Ruby SAML Auth Bypass, XML Parser Differential Devolutions SQL Injection, Password Manager Flaw Vivotek Unauthenticated RCE, EOL IP Camera Flaw Lynx+ Critical Flaw, Unauthenticated Reset Firebox Default Credentials, CVE-2025-59396 Veeder-Root RCE, Critical ATG Flaw ArcGIS Server SQLi Watchdoc RCE, CVE-2025-58384 Delta DIALink Daikin Security Gateway, authentication bypass Frostbyte10, industrial controller security SunPower, vulnerability Ubiquiti UniFi Connect, EV Station Vulnerabilities Adobe Experience Manager, RCE Vulnerability UniFi Access, Command Injection LDAPNightmare - CVE-2025-1316

Your Bluetooth headphones might be doing more than just playing your favorite tunes—they could be handing over the keys to your digital life. A new report from ERNW Enno Rey Netzwerke GmbH has exposed a trio of critical vulnerabilities in chips used by major audio brands, allowing attackers to eavesdrop on conversations and even hijack the connected smartphone.

The research, detailed in a white paper titled “Airoha RACE: Bluetooth Headphone Vulnerabilities,” focuses on a widespread series of Bluetooth Systems on a Chip (SoCs) manufactured by Airoha. These chips power millions of “True Wireless Stereo” (TWS) earbuds and headphones from industry giants like Sony, JBL, Marshall, and Jabra.

At the heart of the issue is a proprietary diagnostic protocol called RACE. Intended for factory debugging, this powerful tool was essentially left “unlocked” on production devices, exposed over Bluetooth Classic and Bluetooth Low Energy (BLE).

“In essence, the issues can be summarized as missing authentication in combination with a powerful debug-like protocol,” the report states.

Because the protocol lacks authentication, any attacker within Bluetooth range can connect to the headphones without the user ever knowing. Once connected, the RACE protocol grants “extensive access to the devices,” allowing intruders to read and write to the device’s memory and flash storage .

This isn’t just about changing volume levels. The researchers demonstrated that they could “read out metadata related to the currently playing media,” effectively spying on what the user is listening to. More alarmingly, the lack of basic pairing security allows attackers to hijack the microphone directly.

“The lack of pairing does not only enable unauthenticated attackers to use the RACE protocol. It constitutes a vulnerability on its own… This might allow eavesdropping via the device’s microphone”.

While hacking headphones is concerning, the real danger lies in what researchers call “Headphone Jacking.” By chaining these vulnerabilities together, attackers can pivot from the earbuds to the user’s smartphone.

The attack works by dumping the headphone’s flash memory to steal the Bluetooth Link Key—the cryptographic secret that establishes trust between the phone and the headset.

“When the three vulnerabilities are chained together, the impact can be shifted from ‘hacking headphones’ to ‘compromising the phone,'” the researchers warn.

Armed with this key, an attacker can impersonate the trusted headphones and connect directly to the victim’s phone. From there, the possibilities are terrifying. The report details scenarios where attackers could “trigger voice assistants,” “send text messages,” or even “silently accept a call and receive the audio stream,” turning the phone into a remote bug.

The vulnerabilities, tracked as CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702, affect a staggering array of popular devices. The researchers verified the flaws in models including:

  • Sony: WH-1000XM5, WF-1000XM5, LinkBuds S
  • JBL: Live Buds 3, Endurance Race 2
  • Marshall: Major V, Acton III
  • Beyerdynamic: Amiron 300

While some manufacturers like Jabra have begun releasing patches, the fragmentation of the Bluetooth market means many users remain at risk. “Due to the sheer amount of devices that are potentially still affected, there is no proper overview over the current status of fixes,” the report notes.

Security experts are urging users to check for firmware updates immediately. ERNW has also released a RACE Toolkit for technical users to verify if their devices are vulnerable.

“Individuals that consider themselves high risky targets… are advised to use wired headphones instead of Bluetooth headphones,” the report concludes.

Related Posts:


文章来源: https://securityonline.info/headphone-jacking-critical-flaws-in-popular-earbuds-let-hackers-hijack-your-phone/
如有侵权请联系:admin#unsafe.sh