WhisperPair: Hijacking Bluetooth Accessories Using Google Fast Pair
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细阅读文章,理解它的主要观点。 文章讲的是Google的Fast Pair功能存在一个安全漏洞,叫做WhisperPair。这个漏洞允许攻击者在未经用户同意的情况下,强制配对支持Fast Pair的蓝牙设备,比如无线耳机。攻击者可以控制这些设备,播放高音量音频或者录音。此外,攻击者还能利用Google的Find Hub网络来跟踪用户的位置。 接下来,我需要找出文章的关键点:漏洞名称、影响范围、攻击方式、后果以及修复措施。然后把这些信息浓缩到100字以内。 要注意用词简洁明了,避免技术术语过多。同时,要确保所有重要信息都被涵盖:攻击如何进行、可能造成的后果、修复方法以及影响范围。 最后,检查字数是否符合要求,并确保内容连贯。 </think> Google Fast Pair 存在安全漏洞 WhisperPair,允许攻击者强制配对蓝牙设备并控制其功能,甚至通过 Google 的 Find Hub 网络跟踪用户位置。该漏洞影响数百 millions 用户,需通过软件更新修复。 2026-1-20 07:58:36 Author: whisperpair.eu(查看原文) 阅读量:0 收藏

About

Google Fast Pair enables one-tap pairing and account synchronisation across supported Bluetooth accessories. While Fast Pair has been adopted by many popular consumer brands, we discovered that many flagship products have not implemented Fast Pair correctly, introducing a flaw that allows an attacker to hijack devices and track victims using Google's Find Hub network.

We introduce WhisperPair, a family of practical attacks that leverages a flaw in the Fast Pair implementation on flagship audio accessories. Our findings show how a small usability 'add-on' can introduce large-scale security and privacy risks for hundreds of millions of users.

Hijacking Fast Pair Accessories

WhisperPair enables attackers to forcibly pair a vulnerable Fast Pair accessory (e.g., wireless headphones or earbuds) with an attacker-controlled device (e.g., a laptop) without user consent. This gives an attacker complete control over the accessory, allowing them to play audio at high volumes or record conversations using the microphone. This attack succeeds within seconds (a median of 10 seconds) at realistic ranges (tested up to 14 metres) and does not require physical access to the vulnerable device.

The flaw stems from many accessories failing to enforce a critical step in the pairing process. To start the Fast Pair procedure, a Seeker (a phone) sends a message to the Provider (an accessory) indicating that it wants to pair. The Fast Pair specification states that if the accessory is not in pairing mode, it should disregard such messages. However, many devices fail to enforce this check in practice, allowing unauthorised devices to start the pairing process. After receiving a reply from the vulnerable device, an attacker can finish the Fast Pair procedure by establishing a regular Bluetooth pairing.

Tracking Victims Using Google's Find Hub Network

Some devices also support Google's Find Hub network. This enables users to find their lost accessories using crowdsourced location reports from other Android devices. However, if an accessory has never been paired with an Android device, an attacker can add the accessory using their own Google account. This allows the attacker to track the user via the compromised accessory. The victim may see an unwanted tracking notification after several hours or days, but this notification will show their own device. This may lead users to dismiss the warning as a bug, enabling an attacker to keep tracking the victim for an extended period.

This attack exploits the fact that non-Android devices do not perform the Fast Pair procedure when they connect to an accessory. Android devices write an Account Key to the accessory after the pairing has completed. This key is used to establish ownership of the device, as the first key written to a device is marked as the Owner Account Key. Therefore, if the victim has never connected their accessory to an Android device, the attacker will be marked as the owner after writing their account key.

Impact

WhisperPair is not an isolated issue. Our study shows that multiple devices, vendors, and chipsets are affected. These vulnerable devices passed both the manufacturers' quality assurance tests and Google's certification process, demonstrating a systemic failure rather than an individual developer error. While there is a certification process that devices must undergo before the Fast Pair functionality is activated, insecure implementations still reached the market at scale. This shows a chain of compliance failures in Google Fast Pair, as the vulnerability failed to be detected on all three levels: implementation, validation, and certification.

The consequences of WhisperPair are severe, allowing an attacker to pair with a vulnerable device in seconds. The attack can be performed using commodity hardware and does not require user interaction. In some scenarios, an attacker may also be able to add the accessory to the Find Hub Network using a malicious account.

Responsible disclosure & mitigation

We reported our findings to Google in August 2025, who classified the issue as critical (CVE-2025-36911). We agreed on a 150-day disclosure window, during which Google could work with their ecosystem partners to release security patches. Google awarded us the maximum possible bounty of $15,000 for this issue. We would like to thank the Android Security Team for their responsiveness and collaboration throughout the disclosure process.

The only way to fix this vulnerability is by installing a software update issued by the manufacturer of the accessory. Although many manufacturers have released patches for their impacted devices, software updates may not yet be available for every vulnerable device. We encourage researchers and users to verify patch availability directly with the manufacturer.

Questions and Answers

English

Dutch

Other


文章来源: https://whisperpair.eu/
如有侵权请联系:admin#unsafe.sh