Security researchers have disclosed a new vulnerability during the Bluetooth® pairing process to the CERT Coordination Center and Bluetooth® supplier industry.
Certain Intel products that support Bluetooth® are among those affected by this industry vulnerability.
- During the Bluetooth® pairing process, an attacker with physical proximity (usually within 30 meters) can gain unauthorized access via an adjacent network, and intercept traffic and send forged pairing messages between two vulnerable Bluetooth devices.
- This may result in information disclosure, elevation of privilege and/or denial of service. (E.g. a Bluetooth headset may have its audio compromised, or a Bluetooth keyboard may have its keystrokes recorded and/or altered).
- Intel® Dual Band Wireless-AC
- Intel® Tri-Band Wireless-AC
- Intel® Wireless-AC family of products
Intel recommends that customers deploy available updates as soon as possible. Check with your system manufacturer to see if they have an updated Bluetooth driver available.
For Microsoft® Windows™ 7, 8.1, and 10, you can use the Intel® Driver and Support Assistant to identify and update your driver (v20.60 and later) directly from Intel:
- Click here to access The Intel® Driver and Support Assistant
- You can also download the latest available Bluetooth driver here
For Google Chrome OS:
- Intel® Bluetooth FW binary with an update resolving the vulnerability has been upstreamed to Chromium
- A Chrome OS update is also required. For any Google Chrome OS solution and schedule, please contact Google directly
For Linux OS see Github