This worrying Bluetooth security flaw could let hackers spy on your device via microphone


- Security researchers found three medium-severity flaws in Bluetooth SoCs
- When chained, they can be used to eavesdrop on conversations, and more
- Patches are being developed, so be on your guard
Security researchers have uncovered three vulnerabilities in a Bluetooth chipset present in dozens of devices from multiple manufacturers.
The vulnerabilities, they say, can be exploited to eavesdrop on people’s conversations, steal call history and contacts information, and possibly even deploy malware on vulnerable devices.
However, exploiting the flaws for these purposes is quite difficult, so practical implementation of the bugs remains rather debatable.
Difficult to pull off
Security researchers ERNW recently found three flaws in the Airoha system on a chip (SoC), apparently “widely used” in True Wireless Stereo (TWS) earbuds.
The SoC is allegedly present in 29 devices from different manufacturers, including a couple of high-profile names: Beyerdynamic, Bose, Sony, Marshall, Jabra, JBL, Jlab, EarisMax, MoerLabs, and Teufel. Speakers, earbuds, headphones, and wireless microphones all seem to be affected.
The bugs are now tracked under these CVEs:
CVE-2025-20700 (6.7/10) – missing authentication for GATT services
CVE-2025-20701 (6.7/10) – missing authentication for Bluetooth BR/EDR
CVE-2025-20702 (7.5/10) – critical capabilities of a custom protocol
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The researchers said that a threat actor with a rather high technical skill set could, if they are within Bluetooth range, pull off an attack and hijack the connection between the phone and the Bluetooth device.
They could then issue different commands to the phone, including initiating or receiving calls, or retrieving the phone’s call history and contacts.
They could also “successfully eavesdrop on conversations or sounds within earshot of the phone,” they said. Ultimately, they said it was possible to rewrite the device’s firmware and thus deploy different malware variants.
But the attacks are difficult to pull off, which could mean that only advanced adversaries, such as state-sponsored threat actors, might try to abuse the flaws. In any case, Airoha released an updated SDK with a set of mitigations, which the manufacturers now started turning into patches.
Via BleepingComputer
You might also like
Security researchers found three medium-severity flaws in Bluetooth SoCs When chained, they can be used to eavesdrop on conversations, and more Patches are being developed, so be on your guard Security researchers have uncovered three vulnerabilities in a Bluetooth chipset present in dozens of devices from multiple manufacturers. The vulnerabilities,…
Recent Posts
- Nintendo revealed the Super Mario Odyssey team made Donkey Kong Bananza
- Fortnite next season release date and what to expect from Chapter 6 Season 4
- How EU data sovereignty rules could impact UK organizations: what you need to know
- Sharp pencils for hard times
- The Running Man mixes mayhem and humor in first trailer
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020