BLURtooth vulnerability exposes devices to MITM attack

BLURtooth vulnerability exposes devices to MITM attack

According to researchers, the attacks carried out by exploiting BLURtooth vulnerability are being referred to as the BLUR attacks.


With rising technological advancements, there has been pressure to reduce the amount of moving parts in any device and to minimize the use of physical components. This is one reason why headphone jacks are also being abandoned bringing the use of Bluetooth to the forefront.


See: BlueRepli attack lets hackers bypass Bluetooth authentication on Android


However, just like every protocol, it is important to remember that it can be vulnerable as well. Keeping this in mind, recently researchers have discovered that the Cross-Transport Key Derivation (CTKD) which can be found in both versions 4.2 and 5.0 of Bluetooth’s core specifications is vulnerable to a Man in the Middle Attack (MITM).


Dubbed as BLURtooth and identified as CVE-2020-15802; the vulnerability targets the fact that CTKD is used for the authentication that occurs when multiple devices connect to each other. It does so by allowing the user to choose 1 out of 2 standards, namely Low Energy (BLE) and Basic Rate/Enhanced Data Rate ( blurtooth vulnerability exposes devices attack