WhisperPair flaw lets hackers eavesdrop on select Google Fast Pair devices

TL;DR Summary
Security researchers disclosed a flaw called WhisperPair in Google's Fast Pair protocol that could let an attacker within Bluetooth range pair with 17 affected headphones and speakers from 10 brands, enabling microphone access, ambient audio eavesdropping, audio injection, or location tracking. Google says Pixel Buds are patched and has provided fixes to OEMs; some updates require the manufacturer’s app. The researchers demonstrated the vulnerability and noted patches have been rolled out, though workarounds exist and continued vigilance on firmware updates is advised.
Topics:technology#bluetooth-security#cybersecurity#fast-pair#firmware-updates#pixel-buds#whisperpair
- Flaw in 17 Google Fast Pair audio devices could let hackers eavesdrop Engadget
- Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking WIRED
- Many Bluetooth devices with Google Fast Pair vulnerable to “WhisperPair” hack Ars Technica
- You Need to Check Your Wireless Headphones for Updates, Right Now Gizmodo
- 'Hundreds of millions' of Bluetooth earbuds, headphones, and speakers vulnerable to tracking and eavesdropping — what to do right now Tom's Guide
Reading Insights
Total Reads
0
Unique Readers
10
Time Saved
4 min
vs 5 min read
Condensed
91%
903 → 82 words
Want the full story? Read the original article
Read on Engadget