New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points

  /     /     /  
Publicated : 23/11/2024   Category : security


New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points


BleedingBit could give attackers control of the wireless network from a remote vantage point.



Updated 11/5/2018 11:30AM with comments from Cisco
Wi-Fi access points and other devices using Bluetooth Low Energy (BLE) chips made by Texas Instruments contain vulnerabilities that could allow an attacker to take control of the wireless network.
The vulnerable TI chips are used in Wi-Fi access points made by Aruba, Cisco, and Meraki — vendors that together account for nearly 70% of the enterprise WiFi access point (AP) market.
Researchers at Armis, an IoT security firm, found two new, separate vulnerabilities in TI CC2640/50 and TI cc2540/1 chips. Dubbed BleedingBit by the researchers, the vulnerabilities allow exploits in two different attacks.
Ben Seri, vice president of research at Armis, says the first vulnerability, CVE-2018-16986, is an overflow in the field that stores advertising packets sent by devices in the APs area to let the AP know that the device is there. [
Authors Note: As of 11/5/2018, the listed CVE points to a reserved page with no additional info. It is, however, the CVE provided by Armis, Cisco, and CERT. CVE-2018-15454 was filed by MITRE and describes the same vulnerability.]
Its supposed to be six bits, but these chips look at two additional bits that are supposed to be zero, Seri says. If an attacker sends a number of well-formed advertising packets containing code, and then a malformed packet with a one in either of those two extra bit places, it results in a stack overflow that could allow execution of all that earlier-delivered code.
What kind of code could be delivered? One possibility is a backdoor that would allow the attacker complete access to the device. At that point, The attack can move from the BLE chip to the rest of the network, Seri says.
The second vulnerability, CVE-2018-7080, affects only Aruba APs, but can deliver larger payload in a single step. Aruba included an
over-the-air download
(OAD) feature through BLE as a tool for use in the development process. When that feature is left active in a production system, an attacker can obtain the hardcoded password and use the feature to completely rewrite the APs operating system.
The true problem with both of these vulnerabilities, says Seri, is, Theres nothing looking at BLE as an attack vector. No one considers this a risk surface, so its a complete blind spot from an organizational perspective.
Seri and Armis security researcher Dor Zusman will discuss their chip findings on in detail in the session
BLEEDINGBIT: Your APs Belong to Us
at Black Hat Europe, December 3 - 6.
Both
Cisco
and
Aruba
have issued security bulletins covering the vulnerabilities. Seri says that other devices outside the parameters of this research may well have used the vulnerable devices, and might be exploitable with serious consequences.
Because of its position within the systems where its employed, the BLE chip can provide a very powerful point of entry for an attacker.In your smartwatch and home control, the BLE chip can be the only chip on the system, Seri says. An insulin pump might have only the BLE chip, so gaining access to the chip automatically gives full control over the device.
Cisco responded to this article with the following:
Cisco has identified a limited number of Aironet Access Points and Meraki Access Points that could potentially be affected by this third-party software issue - when certain conditions are met. An attack attempt would require adjacent proximity to the device, that the BLE feature be enabled, and for scanning mode to be enabled. Scanning is disabled by default for all of our potentially affected products, and the BLE feature is disabled by default on the potentially affected Aironet devices.
Fixed software was published for all of Cisco’s affected products prior to Nov. 1. A PSIRT advisory was published at the time of the researcher’s disclosure Nov. 1 via our
established disclosure page
. Meraki also has published an advisory in the customer dashboard, and documentation is available to disable to involved settings.  
Links to relevant content are as follows:
PSIRT Security Advisory:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181101-ap
Meraki guidance on how to disable settings:
https://documentation.meraki.com/MR/Bluetooth/Bluetooth_Low_Energy_(BLE)#Enable_Bluetooth_Scanning
Cisco Statement
“Cisco is aware of the third-party software vulnerability in the Bluetooth Low Energy (BLE) Stack on select chips that affects multiple vendors. When issues such as this arise, we put the security of our customers first and ensure they have the information they need to best protect their networks. Cisco has identified a limited number of Aironet and Meraki Access Points which, under certain conditions, may be vulnerable to this issue.
Cisco PSIRT has issued a security advisory to provide relevant detail about the issue, noting which Cisco products may be affected and subsequently may require customer attention. Fixed software is available for all affected Cisco products. Cisco is not aware of any malicious use of the vulnerability.”
Related Content
:
New Report: IoT Now Top Internet Attack Target
100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials
4 Trends Giving CISOs Sleepless Nights
Torii Breaks New Ground For IoT Malware
 
 
Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the
conference
 and
to register.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points