Guidance on closing Bluetooth attack vectors

Guidance on closing Bluetooth attack vectors

By eeNews Europe

The idea for the overview was conceived after the Bluetooth Special Interest Group (SIG) published instructions for eliminating security vulnerabilities in “Secure Simple Pairing” and “LE Secure Connections” processes. The site is updated with the assistance of Rutronik’s franchise partners.

Bluetooth specifications from V2.1+EDR to V5.0 are affected by the security vulnerability. Device manufacturers are responsible for patching the wireless stacks in the end devices via FOTA (firmware update over the air) to ensure they are free of flaws. This feature is supported by all current Bluetooth components in the Rutronik UK portfolio.

Nordic Semiconductor already offers faultless stacks and other suppliers are currently working on patches. The device manufacturers are required to forward the available updates to their devices as quickly as possible to stop the attack gap being exploited.

More information


Related news

IoTMark benchmark available for BLE edge nodes

Demonstration of stereo Hi-Fi quality audio over Bluetooth Low Energy

Two-chip module combines BLE with long range LoRaWAN

0.8V-transceiver is compatible with Arm Cordio IP for BLE 5

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News