
According to ERNW, three vulnerabilities have been identified in Airoha Systems on a Chip (SoCs) that are widely used in True Wireless Stereo (TWS) headphones.
The problems affect at least 29 devices from Beyerdynamic, Bose, Sony, Marshall, Jabra, JBL, Jlab, EarisMax, MoerLabs, and Teufel. The list of vulnerable products includes speakers, headphones, earbuds, and wireless microphones.
The vulnerabilities aren’t critical, and to exploit them, an attacker must be within the Bluetooth range of the target device; however, they can be used to hijack the vulnerable product, thus, giving the attacker access to victim’s call history and contacts.
The vulnerabilities were listed under the following CVE numbers:
- CVE-2025-20700 (CVSS score 6.7): Missing Authentication for GATT Services;
- CVE-2025-20701 (CVSS score 6.7): Missing Authentication for Bluetooth BR/EDR; and
- CVE-2025-20702 (CVSS score 7.5): Critical Capabilities of a Custom Protocol.
At this year’s TROOPERS Conference, ERNW researchers reported that they have already produced a PoC exploit making it possible to read currently playing media content from vulnerable headphones.

Other possible attack scenarios are much more severe: an attacker can establish a Bluetooth HFP connection to a vulnerable device and listen to what its microphone is currently recording; while the Bluetooth Hands-Free Profile (HFP) can be used to issue commands to the vulnerable mobile phone.
“We demonstrated the full attack chain, starting with the extraction of Bluetooth link keys from the headphones’ flash memory. These keys were then used to impersonate the headphones to a previously paired phone and to trigger a call to an arbitrary number… The range of available commands depends on the mobile operating system, but all major platforms support at least initiating and receiving calls,” — ERNW Enno Rey Netzwerke GmbH.
A call initiated by an attacker can result in successful eavesdropping on conversations and sounds within earshot of the device’s microphone.
Worse, the firmware of a vulnerable device could be rewritten to gain remote code execution, which opens the way for a wormable exploit that can spread to other gadgets.
Fortunately, the delivery of such attacks in the real world would require advanced technical knowledge and skills.
Airoha developers have already released an updated SDK fixing the three identified vulnerabilities, and device manufacturers started developing and shipping patches for their products. However, according to Heise Online, the latest firmware updates for approximately 50% of vulnerable devices are dated May 27, 2025 (or even earlier); while the updated Airoha SDK was released only on June 4, 2025.

2025.02.01 — Critical RCE vulnerability fixed in Cacti
A critical vulnerability has been discovered in the open-source Cacti framework: it enables an authenticated attacker to remotely execute arbitrary code. Vulnerability's ID is CVE-2025-22604; its…
Full article →
2025.02.17 — Dutch police seize 127 servers belonging to Zservers hosting provider
Following the introduction of international sanctions against Zservers, Russian 'bulletproof' hosting services provider, the Dutch National Police (Politie) shut down and seized 127 servers belonging to Zservers/XHost.…
Full article →
2025.02.23 — New JavaScript obfuscation technique uses invisible Unicode characters
According to Juniper Threat Labs , a new JavaScript obfuscation technique that uses invisible Unicode characters was used in a phishing attack targeting Political Action…
Full article →
2025.04.15 — Hackers exploit authentication bypass bug in OttoKit WordPress plugin
Hackers exploit an authentication bypass vulnerability in the OttoKit (formerly SureTriggers) WordPress plugin used by more than 100,000 websites. First attacks were recorded just…
Full article →
2025.03.05 — Polish Space Agency disconnects its network due to hacker attack
Last weekend, the Polish Space Agency (POLSA) had to disconnect all of its systems from the Internet to localize an attack targeting its IT infrastructure. After discovering the intrusion,…
Full article →
2025.01.29 — Google to disable Sync in older Chrome versions
Google announced that in early 2025, Chrome Sync will be disabled in Chrome versions older than four years. Chrome Sync enables users to save and sync their…
Full article →
2025.02.03 — PyPI introduces a project archival system to combat malicious updates
The Python Package Index (PyPI) introduces a new project archival system: a project can now be archived to notify users that it's not expected to be updated…
Full article →
2025.02.20 — Newly-discovered vulnerabilities in OpenSSH open the door to MiTM and DoS attacks
OpenSSH fixed two vulnerabilities that could result in MiTM and denial of service (DoS) attacks. Interestingly, one of these bugs appeared in the code more than 10…
Full article →
2025.01.30 — Hackers use vulnerabilities in SimpleHelp RMM to attack corporate networks
Experts believe that recently patched vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) were used by attackers to gain initial access to corporate networks. A number…
Full article →
2025.03.28 — Zero-day vulnerability in Windows results in NTLM hash leaks
Security experts reported a new zero-day vulnerability in Windows that enables remote attackers to steal NTLM credentials by tricking victims into viewing malicious files in Windows…
Full article →