Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Govee Permanent Outdoor Lights Prism review: Call it a triple play

    SteelSeries Apex Pro Gen 3 review: A gaming keyboard built for speed

    How to build your own air quality meter with a Raspberry Pi and CO2 sensor

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025

      AI has become the norm for students. Teachers are playing catch-up.

      December 23, 2025

      Trump signs executive order seeking to ban states from regulating AI companies

      December 13, 2025

      Apple’s AI chief abruptly steps down

      December 3, 2025

      The issue that’s scrambling both parties: From the Politics Desk

      December 3, 2025
    • Business

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025

      Zeroday Cloud hacking event awards $320,0000 for 11 zero days

      December 18, 2025

      Amazon: Ongoing cryptomining campaign uses hacked AWS accounts

      December 18, 2025

      Want to back up your iPhone securely without paying the Apple tax? There’s a hack for that, but it isn’t for everyone… yet

      December 16, 2025
    • Crypto

      Zcash Buyers Absorb The 10% Profit-Booking Hit — Breakout Attempt Back On Track?

      January 1, 2026

      Lighter CEO Addresses “FUD” Claims As LIT Price Dips 8% in 24 Hours

      January 1, 2026

      Why Could Dogecoin (DOGE) Set a New Low in Early 2026?

      January 1, 2026

      What Crypto Whales Are Buying and Selling on New Year’s Day 2026

      January 1, 2026

      Berkshire Hathaway’s $382 Billion Cash Pile Sparks Crypto Speculation as Buffett Retires

      January 1, 2026
    • Technology

      Govee Permanent Outdoor Lights Prism review: Call it a triple play

      January 1, 2026

      SteelSeries Apex Pro Gen 3 review: A gaming keyboard built for speed

      January 1, 2026

      How to build your own air quality meter with a Raspberry Pi and CO2 sensor

      January 1, 2026

      A timeline of the major deals between publishers and AI tech companies in 2025

      January 1, 2026

      For platforms, here’s what’s not going to happen in 2026

      January 1, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Bluetooth Headphone Jacking: A Key to Your Phone [video]
    Technology

    Bluetooth Headphone Jacking: A Key to Your Phone [video]

    TechAiVerseBy TechAiVerseJanuary 1, 2026No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Bluetooth Headphone Jacking: A Key to Your Phone [video]
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Bluetooth Headphone Jacking: A Key to Your Phone


    Dennis Heinze and
    Frieder Steinmetz

    One
    Security
    Playlists:
    ’39c3′ videos starting here
    /
    audio

    Bluetooth headphones and earbuds are everywhere, and we were wondering what attackers could abuse them for. Sure, they can probably do things like finding out what the person is currently listening to. But what else? During our research we discovered three vulnerabilities (CVE-2025-20700, CVE-2025-20701, CVE-2025-20702) in popular Bluetooth audio chips developed by Airoha. These chips are used by many popular device manufacturers in numerous Bluetooth headphones and earbuds.

    The identified vulnerabilities may allow a complete device compromise. We demonstrate the immediate impact using a pair of current-generation headphones. We also demonstrate how a compromised Bluetooth peripheral can be abused to attack paired devices, like smartphones, due to their trust relationship with the peripheral.

    This presentation will give an overview over the vulnerabilities and a demonstration and discussion of their impact. We also generalize these findings and discuss the impact of compromised Bluetooth peripherals in general. At the end, we briefly discuss the difficulties in the disclosure and patching process. Along with the talk, we will release tooling for users to check whether their devices are affected and for other researchers to continue looking into Airoha-based devices.

    Examples of affected vendors and devices are Sony (e.g., WH1000-XM5, WH1000-XM6, WF-1000XM5), Marshall (e.g. Major V, Minor IV), Beyerdynamic (e.g. AMIRON 300), or Jabra (e.g. Elite 8 Active).

    Airoha is a vendor that, amongst other things, builds Bluetooth SoCs and offers reference designs and implementations incorporating these chips. They have become a large supplier in the Bluetooth audio space, especially in the area of True Wireless Stereo (TWS) earbuds. Several reputable headphone and earbud vendors have built products based on Airoha’s SoCs and reference implementations using Airoha’s Software Development Kit (SDK).

    During our Bluetooth Auracast research we stumbled upon a pair of these headphones. During the process of obtaining the firmware for further research we initially discovered the powerful custom Bluetooth protocol called *RACE*. The protocol provides functionality to take full control of headphones. Data can be written to and read from the device’s flash and RAM.

    The goal of this presentation is twofold. Firstly, we want to inform about the vulnerabilities. It is important that headphone users are aware of the issues. In our opinion, some of the device manufacturers have done a bad job of informing their users about the potential threats and the available security updates. We also want to provide the technical details to understand the issues and enable other researchers to continue working with the platform. With the protocol it is possible to read and write firmware. This opens up the possibility to patch and potentially customize the firmware.

    Secondly, we want to discuss the general implications of compromising Bluetooth peripherals. As smart phones are becoming increasingly secure, the focus for attackers might shift to other devices in the environment of the smart phone. For example, when the Bluetooth Link Key, that authenticates a Bluetooth connection between the smart phone and the peripheral is stolen, an attacker might be able to impersonate the peripheral and gain its capabilities.

    Licensed to the public under http://creativecommons.org/licenses/by/4.0

    Download

    Video

    These files contain multiple languages.

    This Talk was translated into multiple languages. The files available
    for download contain all languages as separate audio-tracks. Most
    desktop video players allow you to choose between them.

    Please look for “audio tracks” in your desktop video player.

    Audio

    Tags

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleI rebooted my social life
    Next Article Meta made scam ads harder to find instead of removing them
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Govee Permanent Outdoor Lights Prism review: Call it a triple play

    January 1, 2026

    SteelSeries Apex Pro Gen 3 review: A gaming keyboard built for speed

    January 1, 2026

    How to build your own air quality meter with a Raspberry Pi and CO2 sensor

    January 1, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025567 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025209 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025115 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 202599 Views
    Don't Miss
    Technology January 1, 2026

    Govee Permanent Outdoor Lights Prism review: Call it a triple play

    Govee Permanent Outdoor Lights Prism review: Call it a triple play Skip to content Image:…

    SteelSeries Apex Pro Gen 3 review: A gaming keyboard built for speed

    How to build your own air quality meter with a Raspberry Pi and CO2 sensor

    A timeline of the major deals between publishers and AI tech companies in 2025

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Govee Permanent Outdoor Lights Prism review: Call it a triple play

    January 1, 20260 Views

    SteelSeries Apex Pro Gen 3 review: A gaming keyboard built for speed

    January 1, 20260 Views

    How to build your own air quality meter with a Raspberry Pi and CO2 sensor

    January 1, 20260 Views
    Most Popular

    What to Know and Where to Find Apple Intelligence Summaries on iPhone

    March 12, 20250 Views

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    Senua’s Saga: Hellblade 2 leads BAFTA Game Awards 2025 nominations

    March 12, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.