This post is older than 2 years and might not be relevant anymore
More Info: Consider searching for newer posts

A suite of vulnerabilities related to devices using Low Energy (BLE) wireless communications protocol

Good afternoon,
Today we had a question about the certification of our product related to the reliability of communication.
We received a letter of the following content:

Dear colleagues,
 
FDA was made aware of a suite of vulnerabilities related to devices using Low Energy (BLE) wireless communications protocol. These reported vulnerabilities may allow actors to crash devices, reboot devices and force them into a “deadlocked” state, or bypass security features.
 
The vulnerabilities were published by a group of researcher on February 10th and FDA learned about this issue last week.
Probably this is the communication by the researchers: https://asset-group.github.io/disclosures/sweyntooth/ 
 
The affected chips identified so far are: Texas Instruments, Paddling, Cypress, ST Micro Electronics, Dialog, NXP, Semiconductors, Microchip, Telink Semiconductor – non-exhaustive list.
 
The exploit codes are available – not clear if online or only with the researchers. The researchers are being contacted.
 
It appears that these exploits may not be used directly from the internet, physical proximity to the device being necessary.
 
 
We have no further information but in the public domain there is the following article.
https://www.wired.com/story/bluetooth-flaws-ble-internet-of-things-pacemakers/ 
https://www.zdnet.com/article/unknown-number-of-bluetooth-le-devices-impacted-by-sweyntooth-vulnerabilities/ 
 
Useful resource listing products with :
https://launchstudio.bluetooth.com/Listings/Search 
 
 
You are strongly encouraged to contact your members and request them to start assessing the impact on their products portfolios

I would like to receive your comments regarding the detected vulnerabilities.

Bset regards,

Max

Parents
  • Hi Max

    We've tested these vulnerabilities up against our BLE devices, and we've found that our integration and system tests have been testing all the sequences of transactions that have been used to explore the vulnerabilities in the BLE chips. These tests have been in our system for years. This means that all versions of our nRF51 and nRF52 BLE stacks are not affected by any of these vulnerabilities. As you can see in the article in question, Nordic Semiconductor is not mentioned as one of the affected devices.

    Best regards,

    Simon

Reply
  • Hi Max

    We've tested these vulnerabilities up against our BLE devices, and we've found that our integration and system tests have been testing all the sequences of transactions that have been used to explore the vulnerabilities in the BLE chips. These tests have been in our system for years. This means that all versions of our nRF51 and nRF52 BLE stacks are not affected by any of these vulnerabilities. As you can see in the article in question, Nordic Semiconductor is not mentioned as one of the affected devices.

    Best regards,

    Simon

Children
Related