Good afternoon,
Today we had a question about the certification of our product related to the reliability of communication.
We received a letter of the following content:
Dear colleagues, FDA was made aware of a suite of vulnerabilities related to devices using Low Energy (BLE) wireless communications protocol. These reported vulnerabilities may allow actors to crash devices, reboot devices and force them into a “deadlocked” state, or bypass security features. The vulnerabilities were published by a group of researcher on February 10th and FDA learned about this issue last week. Probably this is the communication by the researchers: https://asset-group.github.io/disclosures/sweyntooth/ The affected chips identified so far are: Texas Instruments, Paddling, Cypress, ST Micro Electronics, Dialog, NXP, Semiconductors, Microchip, Telink Semiconductor – non-exhaustive list. The exploit codes are available – not clear if online or only with the researchers. The researchers are being contacted. It appears that these exploits may not be used directly from the internet, physical proximity to the device being necessary. We have no further information but in the public domain there is the following article. https://www.wired.com/story/bluetooth-flaws-ble-internet-of-things-pacemakers/ https://www.zdnet.com/article/unknown-number-of-bluetooth-le-devices-impacted-by-sweyntooth-vulnerabilities/ Useful resource listing products with : https://launchstudio.bluetooth.com/Listings/Search You are strongly encouraged to contact your members and request them to start assessing the impact on their products portfolios
I would like to receive your comments regarding the detected vulnerabilities.
Bset regards,
Max