Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

There are vulnerabilities in the "standard" LE pairing, even with MITM, that make these things possible.

Fixed with the BT LE Secure Connections key exchange, but many devices don't implement that



> BLE 4.2 adds 'Secure Connections'. This is apparently also broken and what's more it was broken in 2008 when the same pairing method was used in Bluetooth 2.1!! It doesn't totally break pairing - only the passkey entry method - and you only learn the passkey, not the LTK. But it does allow an attacker to perform a MitM attack if the passkey isn't changed for every pairing attempt.

https://devzone.nordicsemi.com/f/nordic-q-a/14481/secure-ble...


Please cite


https://www.digikey.com/eewiki/display/Wireless/A+Basic+Intr...

(Heading: Pairing Methods for LE Secure Connections (4.2 devices only))


That talks about 4.2 pairing methods. I'm looking for a citation claiming that 4.1 pairing method is in any way insecure




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: