How to protect yourself from KNOB Bluetooth vulnerability

Q: How dangerous is the KNOB Bluetooth vulnerability and what should I be doing to protect my phone?

A: Security researchers recently discovered a way to intercept a Bluetooth connection between two devices, leading to the ability to plainly view all of the data being transmitted between the two devices.

The “attack” was successful on 17 different kinds of Bluetooth chips on 24 different devices that they tested, which means that every popular brand of device that uses Bluetooth is vulnerable.

It’s being referred to as the KNOB (Key Negotiation of Bluetooth) attack because it changes the initial connection process when two devices are being paired together.

In essence, the security researchers figured out how to lower the encryption level used to keep Bluetooth connections secured, by jumping in during the initial negotiation process before making a connection.

The Bluetooth Special Interest Group, an international organization in charge of Bluetooth standards issued a security warning and developed the basic fix that they provided to hardware manufacturers to implement and distribute.

Proof of concept

While many technology reporters are creating lots of scary-sounding headlines about how unsafe Bluetooth is now that this vulnerability is public, it’s a bit overblown.

The security researchers were able to create a specific situation in their labs to take advantage of the exploit, which only proved that it could be done, not that it is being done.

In order to actually pull this off in real life, the perpetrator would need a really specialized and expensive piece of equipment, be relatively nearby and could only exploit the connection at the very moment that the two devices were attempting to pair with one another.

Even if they were to be in the right place at the right time, if you’re not using Bluetooth to transmit sensitive data, all they would intercept is what song you’re listening to on your ear buds or in your car.

It’s just too complicated and random for it to be attractive to sophisticated cyber thieves. So despite the scary headlines, you’re not suddenly vulnerable because you use a Bluetooth headset, keyboard or mouse.

This vulnerability does not apply to newer BLE (Bluetooth Low Energy) devices, such as fitness devices, proximity sensors or medical devices.

The fix is in

The companies that make Bluetooth chips were actually notified last November so they could work on creating patches before the information became public.

Most major device manufacturers have been including the fix in their recent updates, so if you keep your devices updated regularly, it’s quite possible that you already have the fix installed.

Turn Bluetooth off

There are other serious Bluetooth vulnerabilities, such as BlueBorne, that exist and new methods will likely be discovered in the future. So, it’s always a good idea to turn off Bluetooth when you aren’t using it.

Another small benefit to turning it off is that it helps with precious battery life. A typical Bluetooth radio is routinely scanning for devices to connect to that come into range.

Bluetooth wasn’t developed with security as its primary focus — hopefully that will change — so expect to hear about more discoveries down the road and keep all your devices updated.

Ken Colburn is founder and CEO of Data Doctors Computer Services. Ask any tech question on Facebook or Twitter.

Federal News Network Logo
Log in to your WTOP account for notifications and alerts customized for you.

Sign up