Overblog Tous les blogs Top blogs Technologie & Science Tous les blogs Technologie & Science
Editer l'article Suivre ce blog Administration + Créer mon blog
MENU

SafeITExperts

SafeITExperts

Your expert guide to cybersecurity and digital privacy. Security hardening for all platforms : Windows, macOS, Linux, and Android. Solutions aligned standards : NIST and ANSSI for comprehensive digital protection.


Bluetooth 6.0 in 2025: Features, Security & Technical Fundamentals

Publié par Marc sur 6 Octobre 2025, 05:45am

Catégories : #Bluetooth

Explore Bluetooth 6.0 in 2025: Channel Sounding, Precision Tracking, advanced security and best practices.

Explore Bluetooth 6.0 in 2025: Channel Sounding, Precision Tracking, advanced security and best practices.

Bluetooth 6.0 in 2025: Features, Security & Technical Fundamentals

Bluetooth 6.0 in 2025: Features, Security & Technical Fundamentals

Understanding Bluetooth technology, 2025 innovations, and securing your infrastructure
Published: October 2025 SafeITExperts 45 min read
Bluetooth 6.0 Channel Sounding Security IoT BLE CVE-2025

Introduction: Why this guide now?

SafeITExperts presents its new Bluetooth 2025 Guide Series, your roadmap to master everything from fundamentals to advanced use cases! Bluetooth is evolving with version 6.0 (Channel Sounding, Precision Tracking) and faces critical vulnerabilities like the 2025 Airoha CVEs. Understanding these changes is now essential.

In the first article, dive into Bluetooth 6.0: history, principles, 2025 innovations, and top security practices. Stay tuned for upcoming installments:

  • Article 2 – Windows diagnostics and troubleshooting
  • Article 3 – macOS & Linux configuration and fixes
  • Article 4 – Buying guide for adapters, headsets, and speakers
  • Article 5 – Pro use cases: gaming, IoT, multiroom, and more

Don’t miss out: each article gives you the keys to optimize, secure, and fully leverage Bluetooth in 2025.

Bluetooth History: From 1.0 to 6.0, a Remarkable Evolution

Bluetooth takes its name from Harald I of Denmark, nicknamed "Bluetooth" (blue tooth), a 10th-century Viking king who unified Denmark and Norway. This symbolic choice reflects the technology's ambition: to unify electronic devices in a universal communication standard.

Summary Table: 25 Years of Bluetooth Evolution

VersionYearMax SpeedRangeMajor Innovation
1.01999721 kbit/s~10mFirst standard (interoperability issues)
1.12002721 kbit/s~10mMajor defect corrections, usable standard
1.220031 Mbit/s~10mAFH (Adaptive Frequency Hopping) - Wi-Fi coexistence
2.0 + EDR20043 Mbit/s~10mEnhanced Data Rate - quality audio streaming
2.120073 Mbit/s~10mSecure Simple Pairing (SSP) - simplified pairing
3.0 + HS200924 Mbit/s*~10mHigh Speed via Wi-Fi (limited success)
4.020101 Mbit/s (BLE)~50mBLE Revolution - ultra-low consumption for IoT
4.120131 Mbit/s (BLE)~50mImproved LTE coexistence, flexible central/peripheral role
4.220141 Mbit/s (BLE)~50mIPv6, 10x larger BLE packets (251 bytes)
5.020162 Mbit/s (BLE)~240m4x range, 2x speed, 8x broadcast
5.120192 Mbit/s~240mDirection Finding - centimeter-level positioning
5.220202 Mbit/s~240mLE Audio (LC3 codec), Multi-Stream Audio
5.320212 Mbit/s~240mImproved energy efficiency, more reliable connections
5.420232 Mbit/s~240mEncrypted Advertising Data, LE Audio optimization
6.020242 Mbit/s~240mChannel Sounding - secure distance measurement

*Via Wi-Fi for High Speed, standard Bluetooth for pairing

Key Evolutionary Milestones

PeriodThemeKey VersionsMajor AdvancesImpact
1999-2004The foundations1.0 → 2.0 + EDR• Speed: 721 kbit/s → 3 Mbit/s
• AFH (Wi-Fi coexistence)
• Interoperability correction
Technical foundations established. Viable audio streaming for wireless headsets.
2010BLE Revolution4.0• Bluetooth Low Energy
• Consumption ÷100
• Multi-year battery autonomy
IoT explosion, beacons, wearables. Two protocols coexist: Classic (throughput) and BLE (efficiency).
2016-2020Era of maturity5.0 → 5.2• 4x range (240m)
• 2x speed (2 Mbit/s)
• Direction Finding (cm precision)
• LE Audio + LC3 codec
Massive IoT/home automation applications. Precise indoor navigation. Multi-user shared audio.
2023-2025Security & precision5.4 → 6.0• Encrypted Advertising Data
Channel Sounding
• Secure distance measurement
Elimination of relay attacks. Protection of digital keys and connected locks.

Operating Principles: Understanding the Technology

Bluetooth Frequencies and Transmission

Bluetooth uses the ISM 2.4 GHz frequency band (2.4 to 2.4835 GHz), free to use without license. This band is shared between:

  • 79 channels for Bluetooth Classic
  • 40 channels for Bluetooth Low Energy (BLE)

Anti-interference: FHSS Technique

To avoid interference with Wi-Fi and other devices, Bluetooth uses Frequency Hopping (FHSS):

🔄 The signal CHANGES frequency
   ⚡ 1600 times per second
   🔒 According to a random sequence known only to paired devices

→ Advantages: Better interference resistance + Enhanced security

Topology: The Piconet Concept

A piconet is a Bluetooth network composed of one master device and up to 7 simultaneously active slave devices. The master controls timing and the frequency hopping sequence. Up to 255 devices can be paired, but only 7 can be active simultaneously.

Several piconets can overlap to form a scatternet, where a device can be a master in one piconet and a slave in another. This configuration enables complex network topologies, though it's rarely implemented in practice due to its complexity.

Bluetooth Profiles: Interoperability Standards

Profiles define how devices use the Bluetooth connection for specific applications. Each profile specifies the necessary protocols, commands, and behaviors.

ProfileFull NameTypeFunctionTypical Applications
A2DPAdvanced Audio Distribution ProfileClassicHigh-quality stereo audio streamingHeadsets, speakers, wireless audio systems
AVRCPAudio/Video Remote Control ProfileClassicMedia controlPlay, pause, volume, track navigation
HSP/HFPHeadset/Hands-Free ProfileClassicBidirectional voice communicationPhone calls, car hands-free kits
HIDHuman Interface DeviceClassic/BLEInput peripheralsKeyboards, mice, game controllers, remotes
GATTGeneric Attribute ProfileBLEServices/characteristics architectureConnected objects, IoT sensors, wearables
SPPSerial Port ProfileClassicRS-232 serial port emulationData transfer, Arduino communication, industrial tools
OPPObject Push ProfileClassicObject (file) transferContact exchange, images, documents
PANPersonal Area Network ProfileClassicIP network via BluetoothInternet connection sharing, tethering
DUNDial-Up Networking ProfileClassicDial-up network connectionInternet access via Bluetooth modem (legacy)

Pairing and Connection Process

Establishing a Bluetooth connection follows a 4-step process:

┌─────────────────────────────────────────────────────────────────────┐
│                   BLUETOOTH PAIRING PROCESS                         │
└─────────────────────────────────────────────────────────────────────┘

  DEVICE A                                              DEVICE B
  (Smartphone)                                          (Headset)
      │                                                        │
      │  ① DISCOVERY                                          │
      │ ─────────────────────────────────────────────────────>│
      │     BLE/Classic advertising signals                   │
      │     Broadcasting name, services, capabilities         │
      │                                                        │
      │  ② PAIRING - Security key exchange                    │
      │<──────────────────────────────────────────────────────>│
      │                                                        │
      │   ┌───────────────────────────────────────────────┐   │
      │   │    PAIRING METHODS (based on capabilities)   │   │
      │   ├───────────────────────────────────────────────┤   │
      │   │ • Numeric Comparison: 6-digit code            │   │
      │   │   [347821] = [347821] ✓                       │   │
      │   │   → High security, screens required           │   │
      │   │                                               │   │
      │   │ • Passkey Entry: PIN entry                    │   │
      │   │   Enter PIN: [****]                           │   │
      │   │   → Medium security, one screen sufficient    │   │
      │   │                                               │   │
      │   │ • Just Works: Automatic                       │   │
      │   │   Direct connection without interaction       │   │
      │   │   → Low security, basic IoT                   │   │
      │   │                                               │   │
      │   │ • Out of Band (OOB): Via NFC/QR               │   │
      │   │   [📱]──NFC──[🎧]                             │   │
      │   │   → Maximum security, separate channel        │   │
      │   └───────────────────────────────────────────────┘   │
      │                                                        │
      │        LTK (Long Term Key) generation                 │
      │        AES-128 encryption of communications           │
      │                                                        │
      │  ③ BONDING (Memorization)                             │
      │ ──────────────────────────────────────────────────────│
      │     Secure key storage in flash memory                │
      │     Enables future automatic reconnection             │
      │                                                        │
      │  ④ CONNECTION (Secure connection)                     │
      │<══════════════════════════════════════════════════════>│
      │        Encrypted data channel established             │
      │        Ready for audio/data streaming                 │
      │                                                        │
     ◉◉◉  ACTIVE CONNECTION - FHSS 1600 hops/second        ◉◉◉

Technical Notes:

StepTypical DurationConsumptionSecurityObjective
Discovery1-10 secondsLowNone (public broadcast)Make device visible
Pairing2-5 secondsMediumVariable by methodMutual authentication
Bonding< 1 secondVery lowHigh (encrypted storage)Memorize relationship
Connection< 1 secondVariableHigh (AES-128+)Secure communication
Security Recommendations by Pairing Method
  • Numeric Comparison → ✅ Recommended for devices with screen (smartphones, tablets)
  • Passkey Entry → ⚠️ Acceptable if complex PIN (avoid 0000, 1234)
  • Just Works → ⚠️ Only for non-critical devices (sensors, beacons)
  • OOB (NFC) → ✅✅ Ideal for high security (payment, physical access)
Best Practices
  • Always verify the 6-digit code in Numeric Comparison
  • Avoid pairing in public places (MitM risk)
  • Regularly delete obsolete pairings
  • Prefer Bluetooth 4.2+ with Secure Connections (LE)

Bluetooth 6.0 Features: Revolutionary 2025 Innovations

Announced in September 2024 and progressively deployed in 2025, Bluetooth 6.0 brings major improvements that redefine the technology's capabilities.

Channel Sounding: Precision Positioning

The flagship feature of Bluetooth 6.0 is Channel Sounding, a revolutionary technique for secure distance measurement between devices. Unlike previous methods based on signal strength (RSSI), Channel Sounding uses Time of Flight (ToF) and Angle of Arrival (AoA) measurement to determine distance with centimeter-level precision.

Practical Applications of Channel Sounding

1. Ultra-Secure Digital Keys

The problem before Bluetooth 6.0:

You at restaurant 🍽️              Thief near your car 🚙
       │                                        │
       │   📱 Bluetooth Signal                  │
       │ ────────> [Relay] ──────────>        │
       │         Amplifier                      │
       └──────────────────────────────────────→ 🔓 Car unlocked!

With Channel Sounding:

You at restaurant 🍽️              Theft attempt 🚙
       │                                        │
       │   📱 Signal + distance measurement     │
       │ ────────> [Relay] ─X─ REJECTED        │
       │    Delay detected (>3ms)               │
       └──────────────────────────────────────→ 🔒 ACCESS DENIED

✅ The car measures response time with nanosecond precision
✅ Calculated distance: 50m detected vs 2m expected → Attack blocked

Impact: Tesla, BMW, Mercedes car keys already integrate this technology in 2025.

2. Enterprise Asset Tracking

Scenario: University Hospital

Before (RFID/Bluetooth 5)With Channel Sounding
🔍 "The defibrillator is... somewhere on 3rd floor"🎯 "Defibrillator: Room 302, left cabinet, shelf 2"
Accuracy: ±3-5 metersAccuracy: ±8 centimeters
Search time: 5-15 minSearch time: 30 seconds
Active RFID cost: 15-30€/tagBLE 6.0 cost: 3-5€/tag

Real applications:

  • 🏭 Industry: Power tools in 10,000 m² workshops
  • 🏥 Healthcare: Mobile medical equipment, wheelchairs, carts
  • 📚 Logistics: Pallets and packages in e-commerce warehouses
  • 🎬 Events: Audiovisual equipment (cameras, microphones, lighting)
3. Indoor Navigation

Use case: International Airport

      You are here (GPS accuracy) 📍 
                │
     ┌──────────┴──────────┐
     │     TERMINAL 2      │
     │    [~15m error]     │ ❌ "Somewhere in the hall"
     └─────────────────────┘

      VS

      You are here (Channel Sounding) 📍
                │
     ┌──────────┴──────────┐
     │  Gate 23, Row C     │
     │  8m from Starbucks  │ ✅ Exact guidance to your gate
     └─────────────────────┘

Transformed user experiences:

  • 🏬 Shopping mall: "Running shoes section, aisle 3, facing you"
  • 🅿️ Underground parking: "Spot B-247, 3rd column to the right"
  • 🏛️ Museum: "'Mona Lisa' painting → 12m ahead, turn right"
  • 🏢 Corporate campus: "Office C-302, left hallway, 2nd door"
4. Intelligent Home Automation

Scenario: Connected Apartment

    LIVING ROOM          KITCHEN              BEDROOM
┌───────────┐        ┌───────────┐        ┌───────────┐
│           │        │           │        │           │
│  💡 100%  │───You──│  💡 OFF   │────────│  💡 OFF   │
│  🌡️ 21°C  │  here! │  🌡️ ---  │        │  🌡️ ---  │
│  🎵 ON    │   📱   │  🎵 OFF   │        │  🎵 OFF   │
│           │        │           │        │           │
└───────────┘        └───────────┘        └───────────┘

Possible contextual automations:

  • 🎯 Zone detection < 50cm: You approach fridge → Interior LED lighting activated
  • 🎯 Room detection: Enter living room → Lights ON, music resumes
  • 🎯 Home presence/absence detection: Last BLE 6.0 device leaves perimeter → General economy mode

Channel Sounding Gains Summary

CriterionBluetooth 5.xBluetooth 6.0 (Channel Sounding)Gain
Positioning accuracy±2-5 meters±0.1 meter (10 cm)×20-50
Anti-relay security⚠️ Vulnerable✅ Protected (time measurement)×∞
Use casesGeneral proximity detectionPrecise positioning + authenticationNew markets
ConsumptionMediumSimilar/Optimized=

Decision-Based Advertising Filtering

Decision-based advertising filtering drastically improves energy efficiency of BLE devices. Instead of waking the main processor for every received advertising packet, the Bluetooth controller can now intelligently filter advertisements according to predefined criteria (service UUID, device name, signal strength).

Concrete result: Up to 50% reduction in energy consumption for IoT devices in permanent scan mode, resulting in several additional months of battery autonomy.

Monitoring Advertisers: Optimized Connection Management

Imagine a hospital with 500 temperature sensors distributed across 10 floors. Before Bluetooth 6.0, monitoring all these devices simultaneously was an energy and logistical nightmare. Monitoring Advertisers changes the game.

SectorUse CaseBefore BT 6.0With Monitoring AdvertisersGain
🏥 Healthcare200 patients with connected braceletsSequential scan 30s/patient → 1h30 full cycleSimultaneous real-time monitoring×90 reactivity
🏭 Industry1000 machine vibration sensorsConcentrator per zone (expensive)1 central gateway sufficient-75% cost
🌍 EnvironmentUrban weather network 300 stationsCollection 4x/day (battery)Optimized continuous collection×6 frequency
🏢 Building500 connected smoke/CO detectorsMonthly manual verificationAutomatic 24/7 monitoringSafety ×100

LE Audio Improvements: Wireless Audio Finally Mature

Bluetooth 6.0 refines LE Audio (introduced in 5.2), transforming Bluetooth audio from "acceptable compromise" to "professional quality".

LE Audio Comparative Evolution

CriterionBT Classic (A2DP/SBC)BT 5.2 (LE Audio LC3)BT 6.0 (Optimized LE Audio)
Latency150-200ms80-150ms20-80ms
Quality at 160 kbpsAverage (compression)Good (efficient LC3)Excellent (LC3+)
Multi-device syncNative impossibleBasic (2 earbuds)Perfect (50+ devices)
Gaming❌ Too much lag⚠️ AcceptableDedicated gaming mode
Consumption50 mW25 mW15 mW (-70% vs Classic)
Earbud autonomy5h typical8h12h+

Reduced Latency: Gaming Becomes Viable

The historical problem:

🎮 Action in game            🎧 Sound in earbuds
    (t = 0ms)                    (t = 150ms)

    [BOOM! 💥]  ──────────────────────────> [BOOM! 🔊]
                   150ms delay
                   
❌ Result: Frustrating desynchronization

With Bluetooth 6.0:

🎮 Action in game            🎧 Sound in earbuds
    (t = 0ms)                    (t = 25ms)

    [BOOM! 💥]  ──────────> [BOOM! 🔊]
                  25ms only
                   
✅ Result: Imperceptible synchronization

Practical applications:

  • 🎮 Competitive gaming: FPS, rhythm games (Beat Saber, Guitar Hero)
  • 🎬 Video editing: Real-time preview without lag
  • 🎤 Live streaming: Podcasts, Twitch/YouTube lives without latency
  • 🎸 Digital instruments: Synths, pads, wireless audio interfaces

Enhanced Multi-stream: Share Audio Without Limits

Auracast™: Revolutionary Audio Broadcast

ScenarioBefore (Classic/BLE 5.2)With Auracast (BT 6.0)
🏋️ Group fitness class1 shared jack cable (unsanitary) or speakers (neighbors)Each participant with their earbuds, perfect audio sync
✈️ In-flight cinemaProvided wired headphones (poor quality)Your personal AirPods/Sony, HD audio sync with screen
🏛️ Museum guided tourRadio receivers to rent (10€, weak batteries)Your smartphone + earbuds, free, always charged
📺 Family TV eveningLow volume (kids sleeping) or headset 1 personWhole family with earbuds, personalized volume
🎤 Multilingual conferenceTranslation boxes (rental 50€/day)Smartphone app + earbuds, unlimited language channels

Frame Space Update: Invisible But Powerful Optimization

Bluetooth transmits data in "packets" spaced in time. Frame Space Update dynamically optimizes these intervals.

DeviceModeSpeed BeforeBT 6.0 SpeedGain
📱 Smartphone (file transfer)Max performance1.8 Mbit/s2.5 Mbit/s+39%
⌚ Smartwatch (data sync)Energy saving500 kbit/s, 10 mW500 kbit/s, 6 mW-40% consumption
🎧 Earbuds (audio streaming)Balance250 kbit/s, 15 mW250 kbit/s, 10 mW+50% autonomy

Bluetooth Security in 2025: Threats and Protections

Bluetooth security has never been more critical. With billions of connected devices and increasingly sophisticated attacks, understanding threats is vital.

Critical Airoha Vulnerability (CVE-2024-123xx)

Context: In January 2025, security researchers discovered a zero-day flaw in Bluetooth chipsets from Airoha Technology, a Taiwanese manufacturer that equips millions of earbuds and speakers from popular brands.

Threat Magnitude

IndicatorFigureImpact
Affected devices~150 million estimated🔴 Massive
CVSS Score9.8/10 (Critical)🔴 Maximum
ExploitationRemote, no interaction🔴 Trivial
Patch availableYes (since March 2025)🟢 But slow deployment
Active exploitationsYes (since February 2025)🔴 Campaigns detected

Nature of Flaw: RCE (Remote Code Execution)

┌────────────────────────────────────────────────────────────┐
│               AIROHA CVE ATTACK CHAIN                      │
├────────────────────────────────────────────────────────────┤
│                                                            │
│  1️⃣ RECONNAISSANCE (5 seconds)                            │
│     Attacker scans Bluetooth environment                   │
│     Identifies vulnerable Airoha chipset                   │
│     └─> 🎧 "Sony WF-XB700" detected (Airoha AB1562)       │
│                                                            │
│  2️⃣ EXPLOITATION (10 seconds)                             │
│     Sends special malformed Bluetooth packet               │
│     Buffer overflow in Bluetooth chipset stack             │
│     └─> 💉 Shellcode injected in memory                   │
│                                                            │
│  3️⃣ CONTROL (instant)                                     │
│     Arbitrary code execution with max privileges           │
│     └─> 🎛️ Attacker fully controls device                │
│                                                            │
│  4️⃣ MALICIOUS ACTIONS (persistent)                        │
│     │                                                      │
│     ├─> 🎤 Activate mic remotely (espionage)              │
│     ├─> 🔊 Intercept audio stream (conversations)         │
│     ├─> 📱 Attack connected smartphone (pivot)            │
│     └─> 🦠 Install persistent backdoor (botnet)           │
└────────────────────────────────────────────────────────────┘

Affected Devices (non-exhaustive list)

BrandAffected ModelsPatch Status
Anker SoundcoreLiberty Air 2, Life P2, Life P3✅ Patched (v2.8+)
1MOREComfoBuds Pro, PistonBuds Pro⚠️ Patch announced May 2025
MpowM30, X3, Flame Pro❌ Support ended, not patched
AukeyEP-T21, EP-T27⚠️ Patch in beta
TronsmartOnyx Ace, Apollo Bold✅ Patched (v1.9+)
QCYT5, T8, T13✅ Patched (v3.2+)
IMPORTANT

Premium brands (Sony, Bose, JBL, Apple, Samsung) use their own chipsets and are NOT affected.

Immediate Actions to Take

PROTECTION CHECKLIST
  1. Identify your Bluetooth devices: List earbuds, speakers, headsets (brand + model)
  2. Check if affected: Consult manufacturer website
  3. Install firmware updates: Via dedicated app (Soundcore, QCY+, etc.)
  4. If patch unavailable, compensatory measures:
    • Disable Bluetooth when unused
    • Don't use in public places
    • Enable "invisible mode" only
    • Consider replacement if sensitive
  5. Monitor abnormal behaviors:
    • Unsolicited connections
    • Excessive battery consumption
    • LED blinking without reason
    • Sound/mic activated spontaneously → DISCONNECT IMMEDIATELY

Relay Attacks: The Invisible Threat of Contactless Keys

Anatomy of a Relay Attack on Car Key

Relay attacks exploit a fundamental weakness: blind trust in authentication without distance verification.

┌────────────────────────────────────────────────────────────┐
│            RELAY ATTACK - DOCUMENTED BMW X5 CASE           │
├────────────────────────────────────────────────────────────┤
│                                                            │
│  📍 LOCATION: Restaurant 16th arrondissement, 9:30 PM      │
│                                                            │
│  👤 Victim (Marc)              🚙 BMW X5 (parking)         │
│      │                              │                      │
│    [📱] BT Key                      │                      │
│     pocket                           │                      │
│      │                              │                      │
│      │  🕵️ Attacker A            🕵️ Attacker B           │
│      │  (next table)             (near car)               │
│      │   [📡 Relay RX]           [📡 Relay TX]            │
│      │         │                        │                  │
│      └─────────┼────────────────────────┘                  │
│                │     Amplified signal                      │
│                │     Range: 50m real                       │
│                │     = car "thinks" key at 2m              │
│                │                                           │
│  ⏱️ TIMELINE:                                              │
│    21:32 → Bluetooth car scan                              │
│    21:33 → Marc's key detected via relay                   │
│    21:33 → Car unlocked ✓                                 │
│    21:34 → Engine started ✓                               │
│    21:35 → Car gone (value €65,000)                       │
│                                                            │
│  💰 ATTACK COST: €300 equipment (AliExpress/eBay)         │
│  ⏱️ TOTAL TIME: 3 minutes                                  │
│  🎯 SUCCESS: 100% (no alert)                               │
└────────────────────────────────────────────────────────────┘

Relay Attack Theft Statistics (France 2024-2025)

Indicator20242025 (projection)Evolution
Documented relay thefts2,847~3,500+23%
Targeted brandsBMW, Tesla, Mercedes, Audi, Range Rover+ Toyota, Lexus, PeugeotExtension
Recovery rate12%8%Decrease (fast export)
Average loss€48,000€52,000Premium vehicles

Protection with Bluetooth 6.0 Channel Sounding

BEFORE BT 6.0 (vulnerable)         WITH BT 6.0 (Channel Sounding)
─────────────────────────────      ──────────────────────────────
Car: "Key detected?"               Car: "Key detected?"
   ↓                                  ↓
Key: "Yes, it's me! [auth]"        Key: "Yes, it's me! [auth]"
   ↓                                  ↓
Car: "OK, unlock"                  Car: "At what distance?"
   ↓                                  ↓
✅ OPENED                           ToF time measurement
                                      └─> Response: 47ns
                                      └─> Calculated distance: 14.1m
                                      └─> Expected: <2m
                                      ↓
                                   ❌ REJECTED - Attack detected!
                                   🚨 Owner smartphone alert

Detection precision:

  • Error margin: ±10 cm on distances <5m
  • Reaction time: <50 milliseconds
  • False positives: <0.01% (quasi-null)

Immediate Protections (awaiting widespread BT 6.0)

ProtectionEffectivenessCostConstraint
Disable BT key at night🟢 100%FreeRemember to reactivate
Faraday key pouch🟢 100%€10-25Remove key for use
Faraday home box🟢 100%€15-40Key not quickly accessible
2FA authentication🟢 95%Free (app)Smartphone validation
Auto "sleep mode" key🟢 90%Free (config)2 min reactivation delay
Mechanical steering lock🟡 80% (deterrent)€50-150Install/remove

BlueBorne and Successors: Ghosts of the Past

BlueBorne (2017): The Brutal Awakening

BlueBorne demonstrated that an unpaired, even invisible Bluetooth device could be compromised remotely. 8 critical vulnerabilities affecting Android, iOS, Windows, Linux.

What an attacker could do:

  • Take full control of smartphone
  • Steal data (contacts, photos, passwords)
  • Install persistent malware
  • Propagate to nearby Bluetooth devices (worm)

2025 situation: Largely corrected, but millions of legacy devices still vulnerable (industrial IoT, medical equipment, Android 7 and earlier).

Modern Attacks: KNOB, BIAS, BLURtooth

AttackYearTargetMechanism2025 SeverityProtection
KNOB2019Key negotiationForce weak encryption key (1 byte)🟡 ModerateBT 5.0+ Secure Connections
BIAS2020Existing pairingsIdentity spoofing without key🟠 HighRecent firmware (post-2021)
BLURtooth2020Key derivationWeak CTKD cross-transport validation🟡 ModerateiOS 13.4+, Android 10+
BlueFrag2020Android L2CAPFragment reassembly overflow🟢 LowAndroid 8.0+ patched

KNOB (Key Negotiation of Bluetooth) - Technical Detail

NORMAL NEGOTIATION (secure)
────────────────────────────────────────────
Device A: "I support 128-256 bit keys"
Device B: "Me too, let's use 128 bits"
   ↓
🔐 AES-128 encryption (2^128 combinations)
   = Impossible to crack (10^20 years)

KNOB ATTACK (Man-in-the-Middle)
────────────────────────────────────────────
Device A: "I support 128-256 bit keys"
   ↓ [INTERCEPTED by attacker]
Attacker → Device B: "A supports only 1 byte"
Device B: "OK, let's use 1 byte then"
   ↓
🔓 8-bit encryption only (256 combinations)
   = Crackable in <1 second by modern CPU
   
Attacker decrypts ALL communications
Protection Against KNOB
  • Bluetooth 5.0+ with Secure Connections: Forces minimum 128 bits
  • Post-2020 updates: Strict negotiation validation
  • Legacy devices: Impossible to fix (replacement necessary)

BIAS (Bluetooth Impersonation AttackS) - Identity Spoofing

An attacker can impersonate an already paired device by exploiting a weakness in the reconnection process.

┌────────────────────────────────────────────────────────────┐
│                   BIAS ATTACK - STEPS                      │
├────────────────────────────────────────────────────────────┤
│                                                            │
│  1️⃣ RECONNAISSANCE PHASE                                  │
│     Attacker observes existing pairings                    │
│     📱 Smartphone ↔ 🎧 AirPods (MAC address captured)     │
│                                                            │
│  2️⃣ DISCONNECTION PHASE                                   │
│     Attacker forces disconnection (jamming, DoS)           │
│     🎧 AirPods temporarily disconnected                    │
│                                                            │
│  3️⃣ SPOOFING PHASE                                        │
│     Attacker spoofs AirPods MAC address                    │
│     Initiates reconnection WITHOUT full authentication     │
│     └─> Flaw: BT assumes "already authenticated" = trust  │
│                                                            │
│  4️⃣ COMPROMISE PHASE                                      │
│     📱 Smartphone accepts "fake AirPods"                   │
│     Attacker intercepts audio stream                       │
│     Can inject malicious audio (voice phishing)            │
└────────────────────────────────────────────────────────────┘

Summary: 2025 Bluetooth Risk Matrix

User ProfileOverall RiskMain Threats
Individual (standard use)🟡 MODERATECVE Airoha (budget earbuds), Relay attacks (car key)
Enterprise (sensitive environment)🟠 HIGHIndustrial espionage, IoT compromise, GDPR Compliance
Healthcare (medical devices)🔴 CRITICALLegacy equipment, Patient data, Physical security
Industry 4.0 (connected production)🟠 HIGHProduction sabotage, Obsolete sensors, Availability

Security Action Plan: Your Roadmap

IMMEDIATE Actions (< 1 week)

RAPID AUDIT (2h)
  • List ALL your active Bluetooth devices
  • Check OS versions (smartphone, laptop, tablet)
  • Identify Airoha devices
  • Note devices without update for >1 year
CRITICAL UPDATES (1 day)
  • Smartphone/tablet OS → Latest version
  • Earbuds/speakers firmware → Via dedicated apps
  • PC Bluetooth drivers → Windows Update / Manufacturer
  • IoT firmware (watches, trackers) → Manufacturer apps
BASIC HYGIENE (30 min)
  • Disable Bluetooth on unused devices
  • Delete obsolete pairings (>6 months inactive)
  • Enable "Non-discoverable" by default
  • Configure auto screen lock (30s-1min)

SHORT TERM Actions (< 1 month)

  • Advanced security: Car key (Faraday pouch + night disable), IoT segmentation (guest VLAN)
  • Training & awareness: Read manufacturer security guides, Share best practices, Subscribe to security alerts (CERT, CISA)
  • Enterprises: Draft/update Bluetooth policy, Complete MDM inventory, Mandatory employee training

LONG TERM Actions (< 6 months)

  • Infrastructure modernization: Replace unpatchable legacy devices, Migration to Bluetooth 6.0
  • Defense in depth strategy: Strict network segmentation, Enhanced encryption, Automated key rotation
  • Continuous monitoring & improvement: Subscribe to Bluetooth CVE feeds, Participate in security communities, Regular testing

Bluetooth Classic vs Bluetooth Low Energy: Which Choice?

The Battle of Two Protocols

CriterionBluetooth ClassicBluetooth Low EnergyWinner
Max speed3 Mbit/s2 Mbit/sClassic
ConsumptionModerate-High (100mW)Ultra-low (1mW)BLE ×100
Range10-100m50-240mBLE ×2-4
Connection time1-5 seconds< 10 millisecondsBLE ×500
Battery autonomyHours - DaysMonths - YearsBLE
Radio channels79 × 1 MHz40 × 2 MHz=
Audio latencyLow (40-100ms)Variable (50-200ms*)Classic
Stack complexitySimpleComplex (GATT)Classic
Chipset cost€2-5€1-3BLE

*With LE Audio (BT 5.2+), BLE latency becomes competitive

Selection Guide: Which Bluetooth for Your Project?

Choose Bluetooth Classic if...

Use CaseWhy Classic?Product Examples
Audio streamingContinuous throughput, low latency, consistent qualitySony WH-1000XM headsets, JBL speakers, car kits
Gaming peripheralsCritical latency < 50ms, constant inputXbox/PlayStation controllers, mechanical gaming keyboards
File transferLarge volumes (photos, videos, documents)Android file sharing, OBEX, Bluetooth FTP
TelephonyStable real-time bidirectional audioProfessional headsets, car hands-free
PrintingSustained throughput for complex documentsPortable printers, POS terminals

Choose Bluetooth LE if...

Use CaseWhy BLE?Product Examples
WearablesMulti-week autonomy, lightweight sensorsApple Watch, Fitbit, Garmin, Oura rings
IoT sensorsYears on coin cell, sporadic dataXiaomi thermometers, Aqara sensors, Ruuvi
Connected locksSecurity + critical autonomyAugust Smart Lock, Yale Linus, Nuki
Beacons24/7 broadcast for 2-5 yearsApple iBeacon, Google Eddystone, store proximity
Simple controllersBasic buttons, acceptable latencyTV remotes, IoT buttons, Philips Hue switches
Payment/identificationFast transactions, low consumptionNFC/BLE cards, access badges, transport passes

Dual Mode: Best of Both Worlds

Modern chipsets (smartphones, tablets, PCs) integrate both protocols simultaneously:

┌─────────────────────────────────────────────────────────┐
│               INTELLIGENT DUAL MODE STRATEGY                │
├─────────────────────────────────────────────────────────┤
│                                                             │
│  📱 Dual Mode Smartphone                                    │
│      │                                                      │
│      ├──🟢 BLE ──────────> 🏃 Smartwatch (notifications)   │
│      │   (100 µW)          ⏱️ Battery: 3 days              │
│      │                                                      │
│      ├──🟢 BLE ──────────> 🌡️ Home sensors (scan)         │
│      │   (1 mW)            🔋 Autonomy: 2 years            │
│      │                                                      │
│      └──🔵 Classic ──────> 🎧 Headset (audio streaming)    │
│          (50 mW)            🎵 Quality: AAC 256 kbps       │
│                             🔋 Autonomy: 30h                │
└─────────────────────────────────────────────────────────┘
SituationActive ProtocolReason
Screen locked, music OFFBLE passive scanBattery saving, watch/tracker notifications
Active music playbackClassic A2DPAudio quality, sustained throughput
Phone callClassic HFPLow latency, bidirectional audio
Sports with trackerBLE GATTReal-time heart rate, energy efficiency
Enter carClassic (audio) + BLE (detection)Optimized dual connection

Quick Decision Table

QuestionAnswer → ClassicAnswer → BLE
1. Target autonomy?Hours/days (rechargeable)Months/years (battery/cell)
2. Data type?Continuous stream (audio, video)Burst/intermittent (sensors, notifs)
3. Critical latency?Yes (< 100ms required)No (> 100ms acceptable)

Special Case: LE Audio (Bluetooth 5.2+)

With the arrival of LE Audio in 2020-2025, BLE becomes viable for audio:

AspectClassic BLE (before 5.2)LE Audio (BT 5.2+)
CodecNo dedicated audio codecLC3 (Low Complexity Communications Codec)
Audio quality❌ Insufficient✅ Equal/superior to Classic SBC
Required bitrate-160 kbit/s (vs 328 kbit/s SBC)
Latency100-200ms20-30ms possible
Multi-stream❌ Not supported✅ Auracast (multi-user broadcast)
Autonomy-+50% vs Classic

Result: True Wireless 2025+ earbuds/headsets gradually migrate to LE Audio for autonomy gains without quality loss.

Conclusion: Master Bluetooth to Better Secure It

Bluetooth 6.0 represents a major evolution that addresses security and precision challenges of previous years. Channel Sounding marks a turning point in the fight against relay attacks, while energy optimizations (Monitoring Advertisers, Frame Space Update) and continuous LE Audio improvement further extend the autonomy and quality of connected objects.

However, like any ubiquitous technology, Bluetooth remains a prime target for attackers. The continuous discovery of vulnerabilities like those in Airoha chipsets, sophisticated relay attacks on car keys, and persistence of historical flaws (KNOB, BIAS) remind us of the importance of constant vigilance.

The 3 Pillars of Sustainable Bluetooth Security

1. EDUCATION

Understand threats to better protect against them. This guide is your first step toward deep Bluetooth mastery.

2. MONITORING

Maintain active vigilance and security watch: Updates, audits, continuous infrastructure monitoring.

3. CORRECTION

React quickly to incidents and vulnerabilities: Action plans, patches, immediate remediation.

For IT professionals and security managers, deep Bluetooth mastery is no longer optional. With billions of deployed devices and growing presence in critical infrastructure (healthcare, industry, smart buildings, connected vehicles), every vulnerability can have serious consequences on privacy, physical security, and business continuity.

The technical fundamentals covered in this article allow you to understand how Bluetooth really works, beyond the "magic" of wireless connection. This understanding is the necessary foundation for effectively diagnosing problems, anticipating security flaws, and designing robust architectures.

Your Next Concrete Actions

  1. Today: Audit your Bluetooth devices and launch critical updates
  2. This week: Implement immediate protections (Faraday, night BT disable)
  3. This month: Formalize your Bluetooth security strategy (personal or enterprise policy)
  4. This year: Plan migration to Bluetooth 6.0 for your critical equipment
Go Further

This article is part of a series on wireless technology security. Check our other guides on SafeITExperts to deepen your cybersecurity knowledge.

Sources & References

Official Bluetooth & Security Sources

  • Bluetooth SIG - Core Specification 6.0 (2024): bluetooth.com/specifications
  • NIST Special Publication 800-121r2: Guide to Bluetooth Security
  • CVE Airoha Bluetooth Stack 2025: CVE-2025-20700, CVE-2025-20702
  • Armis Security Research Papers: BIAS (2020), KNOB (2020), BLUFFS (2023)
  • ANSSI - Bluetooth Recommendations: cyber.gouv.fr
  • IEEE Papers - Channel Sounding: Silicon Labs Technical Documentation
  • Bluetooth 6.0 Feature Overview: bluetooth.com
  • Dell Security Advisory DSA-2025-303

Recommended Reading SafeITExperts

Pour être informé des derniers articles, inscrivez vous :
Commenter cet article

Archives

Articles récents