Two tools aimed at compromising Bluetooth devices, including PCs, have been released by German programmers at the Chaos Communications Congress in Berlin.
Businesses often ignore Bluetooth from a security point of view, but should be aware that there are fundamental security weaknesses in the wireless specification, according to Thierry Zoller, who introduced the tools at the conference.
Zoller, a security consultant, developed BTCrack, an implementation of a flaw disclosed in 2005 by Israeli security researchers. The tool takes advantage of weak PINs in Bluetooth devices, allowing an attacker to listen in on a pairing session and gain access to both paired devices.
HID Attack is a proof-of-concept exploit for hijacking a Bluetooth keyboard using the Human Interface Device (HID) standard. The attack could allow access to sensitive systems, according to developer Collin Mulliner, who said he came across the problem by accident while developing a software keyboard.
"The threat potential is high, it basically is like getting physical access to the target system," Mulliner said in a paper released in connection with Zoller's talk.
However, several practical obstacles mean that carrying out an attack is difficult, he acknowledged. Not all HID hosts implement server mode, which is necessary for the attack, and the fact that the screen might not be visible adds more complications.
Furthermore, the biggest limitation to Bluetooth attacks is that they must be carried out at close range.