Published • loading... • Updated
Many Bluetooth Devices with Google Fast Pair Vulnerable to “WhisperPair” Hack
The WhisperPair flaw lets hackers hijack Bluetooth audio devices from 10 vendors, risking eavesdropping, call disruption, and location tracking via Google’s Find Hub network.
- KU Leuven Computer Security and Industrial Cryptography group revealed WhisperPair, a flaw allowing attackers to hijack Fast Pair–enabled audio accessories and eavesdrop via microphones, researchers said.
- Because many accessories skip a required check, the flaw stems from accessories that skip pairing-mode checks, and researchers privately reported the issues to Google in August using a 150-day coordinated disclosure window.
- Demonstrations show attackers can use any Bluetooth-capable device to force-pair vulnerable accessories up to 14 meters away, completing hijacks in a median 10 seconds or less than 15 seconds, affecting Sony WH-1000XM6, SoundCore Liberty 4 NC, and Jabra Elite 8 Active.
- Some vendors have issued patches, and a Google spokesperson said, `We worked with these researchers to fix these vulnerabilities, and we have not seen evidence of any exploitation outside of this report’s lab setting`, but disabling Fast Pair on Android phones does not stop the attack.
- Researchers found 17 audio accessories from ten companies vulnerable, affecting iPhone users with misleading 'unwanted tracking' notifications and posing long-term persistence risk due to low update rates.
Insights by Ground AI
16 Articles
16 Articles
Coverage Details
Total News Sources16
Leaning Left3Leaning Right0Center6Last UpdatedBias Distribution67% Center
Bias Distribution
- 67% of the sources are Center
67% Center
L 33%
C 67%
Factuality
To view factuality data please Upgrade to Premium











