Called BleedingBit, this vulnerability impacts wireless networks used in a large percentage of enterprise companies.
Two zero-day vulnerabilities in Bluetooth Low-Energy chips made by Texas Instruments (and used in millions of wireless access points) open corporate networks to crippling stealth attacks.
Adversaries can exploit the bugs by simply being approximately 100 to 300 feet from the vulnerable devices. A compromised access point can then lead to an attacker taking control of the access point, capturing all traffic, and then using the compromised device as a springboard for further internal attacks.
The issue impacts Wi-Fi access points made by Cisco, Cisco Meraki and Hewlett-Packard Enterprise’s Aruba, accounting for a large percentage of hardware used in corporations, according to researchers at Israeli security firm Armis. The firm discovered the two bugs earlier this year and publicly disclosed them on Thursday.
“Attacks can be devastating and carried out by unauthenticated users who can exploit these bugs and break into enterprise networks undetected while sitting in the company’s lobby,” said Ben Seri, head of research at Armis.
...there is concern that the BleedingBit vulnerabilities could impact a
larger universe of BLE devices, such as smart locks used in hotel chains
and point-of-sale hardware.
Last year, Armis discovered a nine zero-day Bluetooth-related vulnerabilities, dubbed BlueBorne,
in Bluetooth chips used in smartphones, TVs, laptops and car audio
systems. The scale of affected devices was massive, estimated to impact
billions of Bluetooth devices. more
Recommendation: If your company uses devices made by the manufacturers mentioned, contact them for software patches. ~Kevin