Published 4 months ago • loading... • Updated 4 months ago
Many Bluetooth Devices with Google Fast Pair Vulnerable to “WhisperPair” Hack
The WhisperPair flaw lets hackers hijack Bluetooth audio devices from 10 vendors, risking eavesdropping, call disruption, and location tracking via Google’s Find Hub network.
KU Leuven Computer Security and Industrial Cryptography group revealed WhisperPair, a flaw allowing attackers to hijack Fast Pair–enabled audio accessories and eavesdrop via microphones, researchers said.
Because many accessories skip a required check, the flaw stems from accessories that skip pairing-mode checks, and researchers privately reported the issues to Google in August using a 150-day coordinated disclosure window.
Demonstrations show attackers can use any Bluetooth-capable device to force-pair vulnerable accessories up to 14 meters away, completing hijacks in a median 10 seconds or less than 15 seconds, affecting Sony WH-1000XM6, SoundCore Liberty 4 NC, and Jabra Elite 8 Active.
Some vendors have issued patches, and a Google spokesperson said, 'We worked with these researchers to fix these vulnerabilities, and we have not seen evidence of any exploitation outside of this report’s lab setting', but disabling Fast Pair on Android phones does not stop the attack.
Researchers found 17 audio accessories from ten companies vulnerable, affecting iPhone users with misleading 'unwanted tracking' notifications and posing long-term persistence risk due to low update rates.
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Daily Cyber Security podcast
Daily Cyber Security podcast
SANS Stormcast Friday, January 16th, 2026: Cryptojacking Hidden Gifts; Bluetooth Vulnerability; Reprompt in MSFT Copilot
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) discusses the Google Fast Pair vulnerability that could let attackers hijack audio devices, mirroring recent findings by Belgian researchers.