Bluetooth vulnerabilities can be used for eavesdropping and data theft

📟 News

Date: 30/06/2025

Airoha Bluetooth chipsets installed in dozens of audio devices from various manufacturers can be used for eavesdropping and theft of sensitive data.

According to ERNW, three vulnerabilities have been identified in Airoha Systems on a Chip (SoCs) that are widely used in True Wireless Stereo (TWS) headphones.

The problems affect at least 29 devices from Beyerdynamic, Bose, Sony, Marshall, Jabra, JBL, Jlab, EarisMax, MoerLabs, and Teufel. The list of vulnerable products includes speakers, headphones, earbuds, and wireless microphones.

The vulnerabilities aren’t critical, and to exploit them, an attacker must be within the Bluetooth range of the target device; however, they can be used to hijack the vulnerable product, thus, giving the attacker access to victim’s call history and contacts.

The vulnerabilities were listed under the following CVE numbers:

  • CVE-2025-20700 (CVSS score 6.7): Missing Authentication for GATT Services;
  • CVE-2025-20701 (CVSS score 6.7): Missing Authentication for Bluetooth BR/EDR; and 
  • CVE-2025-20702 (CVSS score 7.5): Critical Capabilities of a Custom Protocol.

At this year’s TROOPERS Conference, ERNW researchers reported that they have already produced a PoC exploit making it possible to read currently playing media content from vulnerable headphones.

Other possible attack scenarios are much more severe: an attacker can establish a Bluetooth HFP connection to a vulnerable device and listen to what its microphone is currently recording; while the Bluetooth Hands-Free Profile (HFP) can be used to issue commands to the vulnerable mobile phone.

“We demonstrated the full attack chain, starting with the extraction of Bluetooth link keys from the headphones’ flash memory. These keys were then used to impersonate the headphones to a previously paired phone and to trigger a call to an arbitrary number… The range of available commands depends on the mobile operating system, but all major platforms support at least initiating and receiving calls,” — ERNW Enno Rey Netzwerke GmbH.

A call initiated by an attacker can result in successful eavesdropping on conversations and sounds within earshot of the device’s microphone.

Worse, the firmware of a vulnerable device could be rewritten to gain remote code execution, which opens the way for a wormable exploit that can spread to other gadgets.

Fortunately, the delivery of such attacks in the real world would require advanced technical knowledge and skills.

Airoha developers have already released an updated SDK fixing the three identified vulnerabilities, and device manufacturers started developing and shipping patches for their products. However, according to Heise Online, the latest firmware updates for approximately 50% of vulnerable devices are dated May 27, 2025 (or even earlier); while the updated Airoha SDK was released only on June 4, 2025.

Related posts:
2025.02.08 — Hackers exploit RCE vulnerability in Microsoft Outlook

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned Federal Civilian Executive Branch (FCEB) Agencies that they have to secure their systems from ongoing…

Full article →
2025.04.29 — FBI Offers 10 million USD for information on Salt Typhoon members

The FBI offers up to 10 million USD for information about members of the Chinese hacker group Salt Typhoon and last year's attack that had…

Full article →
2025.01.29 — Google to disable Sync in older Chrome versions

Google announced that in early 2025, Chrome Sync will be disabled in Chrome versions older than four years. Chrome Sync enables users to save and sync their…

Full article →
2025.03.18 — Black Basta ransomware group developed its own automated brute-forcing framework

According to EclecticIQ, Black Basta Ransomware-as-a-Service (RaaS) group has developed its own automated brute-forcing framework dubbed BRUTED. It's used to hack edge network devices…

Full article →
2025.04.01 — Hackers abuse MU plugins to inject malicious payloads to WordPress

According to Sucuri, hackers store malicious code in the MU-plugins (Must-Use Plugins) directory in WordPress and execute it while remaining undetected. The technique was first discovered…

Full article →
2025.02.17 — Dutch police seize 127 servers belonging to Zservers hosting provider

Following the introduction of international sanctions against Zservers, Russian 'bulletproof' hosting services provider, the Dutch National Police (Politie) shut down and seized 127 servers belonging to Zservers/XHost.…

Full article →
2025.02.21 — Microsoft fixes vulnerability in Power Pages exploited by cybercriminals

Microsoft patched a severe privilege escalation vulnerability in Power Pages used by hackers as a 0-day. The vulnerability tracked as CVE-2025-24989 (CVSS score 8.2) pertains…

Full article →
2025.02.20 — Newly-discovered vulnerabilities in OpenSSH open the door to MiTM and DoS attacks

OpenSSH fixed two vulnerabilities that could result in MiTM and denial of service (DoS) attacks. Interestingly, one of these bugs appeared in the code more than 10…

Full article →
2025.03.10 — Nearly a million Windows computers impacted by a malvertising campaign

According to Microsoft, nearly 1 million Windows devices fell victim to a sophisticated malvertising campaign in recent months. Cybercriminals were able to steal credentials, cryptocurrency, and sensitive…

Full article →
2025.02.05 — Google patches Android zero-day vulnerability exploited by hackers

Google released the February set of patches for Android. In total, they fix 48 bugs, including a kernel zero-day vulnerability actively exploited by hackers. The zero-day's…

Full article →