BrakTooth vulnerabilities impact closed-source Bluetooth stacks used in chips from Espressif, Intel, Qualcomm…

BrakTooth is a family of new security vulnerabilities in commercial, closed-source Bluetooth Classic stacks that range from denial of service (DoS) via firmware crashes and deadlocks to arbitrary code execution (ACE) in certain IoT devices.

A team from Singapore has discovered 16 new security vulnerabilities after evaluating 13 Bluetooth devices from 11 vendors, but after browsing through the list of certified Bluetooth devices with impacted processors, they estimate it could impact 1400 devices.

BrakTooth impacted devices

We can see the list of BrakTooth-impacted SoCs include some familiar names like Intel AX200 (found in many laptops and computers through M.2 cards), Espressif Systems ESP32, Texas Instruments CC2564C, Qualcomm CSR8811/CSR8510, Bluetrum AB32VG1 board (based on AB5301A SoC) which I’ve just reviewed, and more…

The good news is that most vendors have either already submitted a patch or working on it.

BrakTooth firmware patch

Espressif, Infineon (previously Cypress), and Bluetrum already have released patchsets for their firmware. It’s really important to update the ESP32 firmware as they were the only vendor subject to arbitrary code execution (ACE). Harman International and Silbas are still shown as pending since the status is unknown.

Qualcomm will work on a fix for WCN3990/8, but not CSR8811/CSR8510, while Texas Instruments will only work on resolving the issues for CC2564C if customers request it as explained below:

The vendor Texas Instruments has successfully replicated the security issue, however, at this stage has no plan for producing a patch. In particular, according to the Texas Instruments PSIRT team, they will consider producing a patch only if demanded by customers.

Our team approached Qualcomm to inquire whether a patch would be available for the affected devices. We were informed that they are working on a fix for WCN3990/8 and that the security issue reported in Qualcomm CSR8811A08  has been fixed since 2011 only for ROM Versions A12 and beyond. However, new products in 2021 are still being listed to use CSR8811A08, which has no plan to be fixed. Moreover, a patch for the issue on CSR8510A10 …. is not possible …  due to the lack of ROM patch space.

List of Bluetooth Vulnerabilities
List of BrakTooth Vulnerabilities

You may find the full details about the vulnerabilities listed above in the research paper.

BrakToothA silver lining of those vulnerabilities is that we’ve got a new tool to play with the ESP32 Bluetooth Classic Sniffer.  Developed by Matheus Garbelini for bug bounty for three of the BrakTooth vulnerabilities on ESP32, the open-source utility does not interact with the Bluetooth network like passive sniffers, but as an active sniffer, it connects itself to the remote BT device (BR/EDR target) and allows testing the BT protocol down to the Baseband layer while guided by a BT host stack such as blue-kitchen. The ESP32 Bluetooth Classic Sniffer can work on inexpensive boards like ESP32-DOIT or ESP32-DevKitC.

You can see how BrakTooth vulnerabilities can be exploited with a denial-of-service attach using a Bluetooth headset as a test device.

The BrakTooth PoC Tool is available to researchers, Bluetooth semiconductor, module, and OEM vendors only until October 30, 2021, after which it will be made public.

Via ThreatPost and thanks to Zoobab for the tip.

Share this:

Support CNX Software! Donate via cryptocurrencies, become a Patron on Patreon, or purchase goods on Amazon or Aliexpress

Radxa Orion O6 Armv9 mini-ITX motherboard
Subscribe
Notify of
guest


The comment form collects your name, email and content to allow us keep track of the comments placed on the website. Please read and accept our website Terms and Privacy Policy to post a comment.
7 Comments
oldest
newest
Nd D
Nd D
2 years ago

The big cores are 2 generations better than the RK3588. Wonder if MediaTek got a good ARM Linux support.

tonny
tonny
2 years ago

AFAIK, Cortex A-77 is not that good. So we could say that it’s 1 generation better than RK3588’s Cortex A-76. Too bad it’s Mediatek SoC. Meaning: no linux for you.

tkaiser
tkaiser
2 years ago

> Too bad it’s Mediatek SoC. Meaning: no linux for you

Not true for all MediaTek business units. See the upstreaming efforts around their router SoCs and for exampling them partnering with BayLibre for their ‘AIoT’ offerings

Cameron
Cameron
2 years ago

Also their Chromebook SoCs have pretty good upstreaming efforts. The MT8395 looks very similar to their MT8195 Chromebook SoC; I think many drivers will be usable without significant changes. The word Android is a bit of a red flag, though.

Nd D
Nd D
2 years ago

I see. But from what i heard, the jump from A76 to A77 is some of the biggest generational jump. While the jump from A75 to A76 and A77 to A78 are more of a standard/ordinary jump. But i maybe wrong. Anyway, hope we can get better support for Linux from MediaTek and others in the future. The more chip vendors supporting Linux, the merrier.

Steve Nordquist
Steve Nordquist
2 years ago

It does seem like a bunch o’ work to compile Android 13 on it. Is there a RealTek N00B pack like Capstone/Unicorn to flush out all the undisclosed opcodes and whatnot, or is the idea to license the boxed RealTek CN Rust compiler…or simply use GPT3 and hope it’s trained?
Is there no true optimized binary (say, LibC or LINPAC20) for these chips?

Arnd Bergmann
Arnd Bergmann
2 years ago

It always depends on how you want to characterize the changes. The way I’d describe them, there were significant changes in the previous generations (new microarchitecture in Cortex-A73, new ISA and bus interface in Cortex-A75, new microarchitecture again in Cortex-A76), but between Cortex-A76, -A77, -A78 -X1 and Neoverse N1 I only see optimizations of the same basic design instead of generational jumps.

Boardcon CM3588 Rockchip RK3588 System-on-Module designed for AI and IoT applications