Security News > 2024 > March > BSAM: Open-source methodology for Bluetooth security assessment

BSAM: Open-source methodology for Bluetooth security assessment
2024-03-13 05:30

Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security researchers have demonstrated last week at RootedCON in Madrid.

"Many of the examples presented during the conference were real tests on devices that attendees - most of them cybersecurity experts - were carrying with them," they told Help Net Security.

Facilitating security assessment of Bluetooth-enabled devices.

"The problem with the technology lies in the lack of documentation, which does not give visibility to these vulnerabilities around us," the researchers told Help Net Security.

To help manufacturers, researchers, developers, and cybersecurity professionals, the company has developed the Bluetooth Security Assessment Methodology, which can be used to develop tools to audit the security of all types of devices that use Bluetooth and Bluetooth LE technology.

The methodology contains documentation on the Bluetooth standard; 36 controls that must be executed to evaluate the security of Bluetooth communications; and resources to facilitate the execution and evaluation of the controls.


News URL

https://www.helpnetsecurity.com/2024/03/13/bluetooth-security-assessment-methodology/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Bluetooth 4 0 9 7 0 16