1/1/2026 at 1:17:21 PM
Glad this submission is finally receiving upvotes.This was just shown at the 39C3 in Hamburg, few days back.
Common (unpached) Bluetooth headsets using Airoha's SoCs can be completely taken over by any unauthenticated bystander with a Linux laptop. (CVE-2025-20700, CVE-2025-20701, CVE-2025-20702)
This includes firmware dumps, user preferences, Bluetooth Classic session keys, current playing track, ...
> Examples of affected vendors and devices are Sony (e.g., WH1000-XM5, WH1000-XM6, WF-1000XM5), Marshall (e.g. Major V, Minor IV), Beyerdynamic (e.g. AMIRON 300), or Jabra (e.g. Elite 8 Active).
Most vendors gave the security researchers either silent treatment or were slow, even after Airoha published fixes. Jabra was one of the positive outlier, Sony unfortunately negatively.
What is exciting, even though the flaws are awful, that it is unlikely for current generation of those Airoha bluetooth headsets to change away from Aiorha's Bluetooth LE "RACE" protocol. This means there is great opportunity for Linux users to control their Bluetooth headsets, which for example is quite nice in an office setting to toggle "hearthrough" when toggling volume "mute" on your machine.
RACE Reverse Engineered - CLI Tool: https://github.com/auracast-research/race-toolkit
I feel like this should receive state-level attention, the remote audio surveillance of any headset can be a major threat. I wonder what the policies in countries official buildings are when it comes to Bluetooth audio devices, considering that Jabra is a major brand for conference speakers, I'd assume some actual espionage threats.
by miduil
1/1/2026 at 7:41:52 PM
One of the researchers here. Many people seem to prefer text to videos, which I sympathize with. So please excuse me hijacking the top comment with links to our blog post and white paper:Blog: https://insinuator.net/2025/12/bluetooth-headphone-jacking-f...
by willnix
1/2/2026 at 4:27:17 AM
Did you look into whether the spoofed device can also be "upgraded" to be used as an HID device, like a mouse or keyboard? That upgrade would be several CVEs against the OS vendors.That would make the attacks potentially silent, since the attacked could simulate keypresses to dismiss notifications, or can at least keep the target unable to respond by spamming home/back or pressing power and simulating a swipe to shutdown.
by avidiax
1/2/2026 at 7:50:09 AM
You can't change the device class.It would be an vulnerability on the host stack to accept that.
by j16sdiz
1/2/2026 at 7:17:53 AM
[dead]by pamcake
1/2/2026 at 12:45:25 AM
Kamala Harris, citing seemingly classified intelligence, famously raised the alarm on Bluetooth earphones to Stephen Colbert:“I know I've been teased about this, but I like these kinds of earpods that have the thing [pointing to the wire] because I served on the Senate Intelligence Committee. I have been in classified briefings, and I'm telling you, don't be on the train using your earpods thinking somebody can't listen to your conversation.”
https://www.aol.com/kamala-harris-warns-against-wireless-150...
by CGMthrowaway
1/1/2026 at 2:21:29 PM
> Most vendors gave the security researchers either silent treatment or were slow, even after Airoha published fixes. Jabra was one of the positive outlier, Sony unfortunately negatively.While I don't recall Sony issuing an advisory, I believe the users of their app would have started getting update notifications since they (quietly) released firmware updates.
> This means there is great opportunity for Linux users to control their Bluetooth headsets, which for example is quite nice in an office setting to toggle "hearthrough" when toggling volume "mute" on your machine.
I think most vendors are using custom services with their own UUIDs for settings such as this.
Regardless, I believe there are open client implementations for some of the more popular devices. Gadgetbridge comes to mind in regards to Android, not sure about any Linux equivalent.
by Namidairo
1/1/2026 at 3:07:45 PM
Uh totally, I can't believe how much support Gadgetbridge has - wow thanks for the reminder. I'd love to use that on Linux eventually.by miduil
1/2/2026 at 3:06:41 AM
> WH1000-XM6These (and others?) actually have a wired option (even provide the cable) for listening. Sadly the built-in microphone doesn't work in 'wired mode' (though ANC does).
You could get at at "cable boom microphone", e.g.:
* https://www.amazon.com/dp/B07W3GGRF2
* https://www.amazon.com/dp/B00BJ17WKK
Maybe the XM7 will have it (along with wired audio controls) via a CTIA/AHJ TRRS plug:
* https://en.wikipedia.org/wiki/Phone_connector_(audio)#TRRS_s...
or via USB audio.
by throw0101a
1/1/2026 at 6:35:49 PM
Cool! Can you play audio to them too? That would be a practical joker's dream lol.I'm not surprised Jabra acted quickly. They mainly sell too enterprise which generally care very much about security. Sony is more a consumer mfg now.
by wolvoleo
1/1/2026 at 1:32:31 PM
> Glad this submission is finally receiving upvotes.Speaking for myself, I have very little patience for technical videos, so I don't believe I've ever upvoted a YouTube submission.
by macintux
1/1/2026 at 1:46:16 PM
I would read it if it was an article of identical length!One second thought I think this is called a transcript...
---
Edit: Auto-Transcript! (No timestamps, sorry)
by andai
1/1/2026 at 3:16:25 PM
This is a good article: https://insinuator.net/2025/12/bluetooth-headphone-jacking-f...by jakobdabo
1/2/2026 at 7:20:27 AM
[dead]by pamcake
1/1/2026 at 7:09:58 PM
Just throw the link into Gemini and ask for a brief summary :-))by KellyCriterion
1/1/2026 at 6:29:21 PM
> This means there is great opportunity for Linux users to control their Bluetooth headsets, which for example is quite nice in an office setting to toggle "hearthrough" when toggling volume "mute" on your machine.Fun fact: There are at least two applications that reverse engineered AirPods' communication protocol for custom controls - AndroPods from 2020 [1] and LibrePods from 2024 [2].
But... mainstream Android has a bug open in their Bluetooth stack for well over a year now that prevents issuing the commands, meaning to actually use the app you need root rights [3].
[1] https://play.google.com/store/apps/details?id=pro.vitalii.an...
by mschuster91
1/1/2026 at 2:40:16 PM
> This includes firmware dumps, user preferences, Bluetooth Classic session keys, current playing track, ..That doesn't sound very serious if they're exposed, is it? Can it be used to eavesdrop my conversation if I'm speaking through the headphone
by mi_lk
1/1/2026 at 2:47:22 PM
They also demonstrated how this could be used to silently find out someone’s phone number and then hijack a TFA validation call from an app like WhatsApp to take over their account with no user interaction.by DangerousPie
1/1/2026 at 3:32:01 PM
This attack was not silent, it was noisy. They specifically pointed that out in their talk.by Fnoord
1/1/2026 at 2:46:04 PM
the session (or pairing key) means you can both connect to the headphone or impersonate it.It can toggle the hands-free mode and listen to whatever is being talked, you'd notice that it has switched to the mode though - but if you're headphones are powered on and you're not listening to in they can be used for eavesdropping.
During the talk they both demonstrate listening to the microphone and also receiving a WhatsApp 2FA call.
by miduil
1/1/2026 at 2:53:43 PM
presumably, even in hands-free mode the attacker needs to be very close to the speaker to hear itby mi_lk
1/2/2026 at 4:12:29 AM
If you have a Bluetooth analyzer (e.g. Ellisys), then the link key and a directional antenna is all you need to passively eavesdrop on a conversation at a distance.Of course, even regular omnidirectional Bluetooth antennas are plenty to eavesdrop through a hotel room door, from the hallway outside a conference room, etc.
An attacker can also passively record all the packets in an area (Ellisys allows recording all channels at the same time), and then actively gather link keys using this attack at any time to decrypt the stored conversations.
by avidiax
1/1/2026 at 2:17:07 PM
Is this an unintentional vulnerability or is it one of those "we left it open because it's easier and we hoped nobody would notice" kind of things. I mean can you just send a "update to this firmware" command completely unauthenticated and it's like "yep sure"? No signing or anything?by IshKebab
1/2/2026 at 4:15:59 AM
IMO, it's plausible that Airoha and the OEMs did not know about this. The tooling may have been written in a pseudo-secure manner, i.e. requiring pairing (on the client side) before attempting all the debugging/firmware update commands. The tools may simply assume that pairing is required or only list targets from those that are paired and connected, which gives the illusion that the air protocol requires this.All it really takes is some engineer missing an if-statement to check that the connection is bonded before processing the packets.
by avidiax
1/2/2026 at 3:19:23 AM
According to the details in their whitepaper, firmware is signed, but the management protocol allows reading arbitrary memory, so you can read out the keys and sign your own payload.I'm not sure anyone intentionally did this, but there were several poor decisions involved. It sounds like the upstream vendor shipped sample code without auth, assuming implementers would know they needed to secure a privileged device management interface, and said implementers just copied the sample and shipped it.
by abeyer
1/1/2026 at 2:54:44 PM
Finally, a coherent explanation of AirPods glitches ;)by keepamovin
1/1/2026 at 2:20:38 PM
Remote audio surveillance probably be accomplished on wired headphones with TEMPEST [0]/Van Eck phreaking [1]. Not sure about which has a better range and which would be stealthier - TEMPEST or the Bluetooth attack. The Bluetooth attack just requires a laptop. Not sure if the TEMPEST attack would require a big antenna.by bgbntty2
1/2/2026 at 4:18:41 AM
I doubt that audio-spectrum RF/magnetic frequencies emanate strongly from wired headphones. They are simply not a long enough antenna at 200-3,000 Hz. Also, the loop area is quite low. The ground wire runs parallel to the L/R wires, so the only loop to receive is the magnetic coils in the headphones, which are small. Only near field would work, IMO.by avidiax
1/2/2026 at 3:26:56 AM
Even if the TEMPEST were easier, it's significantly less powerful, as it's not going to get you the ability to write malicious firmware to the audio device nor a persistent connection to the host device when the audio device isn't connected.by abeyer