Anonymous ID: 334803 June 26, 2025, 3:13 p.m. No.23242165   🗄️.is 🔗kun   >>2207 >>2232 >>2338 >>2589 >>2673 >>2686 >>2706 >>2720 >>2721 >>2765

https://insinuator.net/2025/06/airoha-bluetooth-security-vulnerabilities/

https://archive.is/kK9ja

 

Security Advisory: Airoha-based Bluetooth Headphones and Earbuds

 

Any vulnerable device can be compromised if the attacker is in Bluetooth range (note: officially 10m).That is the only precondition.

 

During our research on Bluetooth headphones and earbuds, we identified several vulnerabilities in devices that incorporate Airoha Systems on a Chip (SoCs). In this blog post, we briefly want to describe the vulnerabilities, point out their impact and provide some context to currently running patch delivery processes as described at this year’s TROOPERS Conference.

 

Introduction

Airoha is a vendor that, amongst other things, builds Bluetooth SoCs and offers reference designs and implementations incorporating these chips. They have become a large supplier in the Bluetooth audio space, especially in the area of True Wireless Stereo (TWS) earbuds. Several reputable headphone and earbud vendors have built products based on Airoha’s SoCs and reference implementations using Airoha’s Software Development Kit (SDK).

 

Vulnerability Description

At this point, we do not want to disclose too many details, such as proof of concept code (PoCs) or overly technical information. We want to inform about these vulnerabilities, especially their impact and the difficulties around patching them.

 

In short, these devices expose a powerful custom protocol that allows manipulating the device by, for example, reading and writing RAM or reading and writing to the flash.We found this protocol to be exposed via BLE GATT to an unpaired attacker. It is also exposed as RFCOMM channel via Bluetooth BD/EDR (also known as Bluetooth Classic). Missing authentication for Bluetooth Classic allows an attacker to use this protocol without pairing with the device. At this point, we decided not to disclose the name of the protocol.

 

The vulnerabilities are listed under the following CVE numbers that will be published in the future:

 

CVE-2025-20700: Missing Authentication for GATT Services

CVE-2025-20701: Missing Authentication for Bluetooth BR/EDR

CVE-2025-20702: Critical Capabilities of a Custom Protocol

More information will follow in a detailed blog post and white paper later.

 

Affected Devices

The SoCs are used in devices such as headsets, earbuds, dongles, speakers, and wireless microphones. However, it is infeasible for us to comprehensively survey and identify all affected products.

 

During our research, we purchased a number of devices and analyzed devices from friends and colleagues. We can confirm that the issues are prevalent in many entry-level and flagship models. Vendors we confirmed ourselves are Beyerdynamic, Marshall, and Sony. Furthermore, we know of many more devices using the chips that we assume to be vulnerable, too.

 

The following devices were confirmed to be vulnerable:

 

Beyerdynamic Amiron 300

Bose QuietComfort Earbuds

EarisMax Bluetooth Auracast Sender

Jabra Elite 8 Active

JBL Endurance Race 2

JBL Live Buds 3

Jlab Epic Air Sport ANC

Marshall ACTON III

Marshall MAJOR V

Marshall MINOR IV

Marshall MOTIF II

Marshall STANMORE III

Marshall WOBURN III

MoerLabs EchoBeatz

Sony CH-720N

Sony Link Buds S

Sony ULT Wear

Sony WF-1000XM3

Sony WF-1000XM4

Sony WF-1000XM5

Sony WF-C500

Sony WF-C510-GFP

Sony WH-1000XM4

Sony WH-1000XM5

Sony WH-1000XM6

Sony WH-CH520

Sony WH-XB910N

Sony WI-C100

Teufel Tatws2

Obviously, this approach does not provide a complete picture of all affected devices. What makes this even more difficult is the observation that some devices are only affected by a subset of these issues. There is at least one vendor that seems to have mitigated CVE-2025-20700 and CVE-2025-20701. Whether this was done on purpose or by accident is unknown to us.

 

One other issue we identified is that some vendors are not even aware that they are using an Airoha SoC. They have outsourced parts of the development of their device, such as the Bluetooth module. If you are a manufacturer of such a device and are unsure whether your devices might be affected, feel free to contact us.

..,

Anonymous ID: 334803 June 26, 2025, 3:48 p.m. No.23242359   🗄️.is 🔗kun

https://www.youtube.com/watch?v=QyXpG4zX998

 

They Chased Me | Interview With Man Living In Ukraine

 

For those who requested a no background music version of the interview.

In this interview I ask the important questions directly to someone who has lived it and is still living it in Ukraine. This man goes to sleep almost every night with the sound of bombs in the distance. Join us in this discussion and mabye learn from this experience. In any case it is important that you know that Ukraine is hiding some things when it asks for more aid to keep this war going. The average man of Ukraine is tired of all this and they just want the war to end. That doesn't mean Putin is a good guy, but just think about reality and not ideology alignments. Listen to the story of a normal ukrainian. We are sorry for our bad english but it is not our first language.

 

Chapters:

00:00 - The Start

06:15 - super mega fireworks

09:15 - it was like hell

10:36 - superjets

14:36 - super markets make good profit from suffering

15:20 - jobs was slashed

16:59 - how people reacted propaganda worked excellent

18:30 - it's not possible to talk against Ukrainian narrative

19:15 - shut up and stay quiet to survive

20:15 - rich ppl can give big money to save from genocide

21:15 - forced recruitment is real 100%

26:55 - they chased me

28:59 - for me all of them are killers and the wounded don't come back

30:56 - wives send their husbands to die

33:05 - people have 2 options, dead or missing

35:50 - Zelinski Helper Of Satan

39:50 - if God wouldn't help me I wouldn't be alive 100%

43:50 - 40 seconds passed and behind my back there were cluster bombs

45:50 - You can Lose your life in 1 second

47:30 - lessons of war make you realise the important things in life

50:05 - be in the world but not of it

57:45 - it's not the Russians who bombed the street

1:00:48 - if civilian buildings were the target then they would be leveled very fast

1:01:28 - buildings like schools are destroyed because they have switched to being used by the military

1:09:10 - advice for civilians during war time

1:12:20 - Appreciate Life and Make Real Connections

1:13:25 - It's Evil Destroying itself on both sides

1:15:23- Try to not be pulled anywhere, stay centered

1:16:20 - Stock Food

1:21:07 - END