论文标题
Blurtooth:在蓝牙经典和蓝牙低能中利用跨通道密钥推导
BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy
论文作者
论文摘要
蓝牙标准指定了两种传输:用于高通量无线服务的蓝牙经典(BT)和蓝牙低能(BLE),以实现非常低功能的情况。 BT和BLE具有专用的配对协议,并且设备必须配对BT和BLE才能安全使用。 2014年,蓝牙标准(v4.2)通过引入交叉转移密钥推导(CTKD)来解决此可用性问题。 CTKD允许仅通过将两种运输方式配对来建立BT和BLE配对键。尽管CTKD越过BT和BLE之间的安全边界,但对CTKD的内部及其安全含义知之甚少。 在这项工作中,我们介绍了通过将蓝牙标准中的分散信息与我们的反向工程实验的结果合并而获得的CTKD的第一个完整描述。然后,我们对CTKD进行了安全评估,并在其规范中发现了四个跨通道问题。我们利用这些问题设计了对CTKD的四次符合标准攻击,从而实现了利用蓝牙的新方法(例如,仅针对两者中的一种来利用BT和BLE)。即使有最强的BT和BLE安全机制,我们的攻击也起作用,包括数字比较和安全连接。他们允许模仿中间人,并用任意设备建立意想不到的会议。我们将攻击称为模糊攻击,因为它们模糊了BT和BLE之间的安全边界。我们提供了模糊攻击的低成本实现,并在14个设备上成功评估了它们,并使用16个来自受欢迎的供应商的独特蓝牙芯片进行了评估。我们讨论了攻击的根本原因,并提出了有效的对策来修复它们。我们在2020年5月(CVE-2020-15802)向蓝牙SIG披露了我们的发现和对策,并在2021年5月报告了其他未置疑的问题。
The Bluetooth standard specifies two transports: Bluetooth Classic (BT) for high-throughput wireless services and Bluetooth Low Energy (BLE) for very low-power scenarios. BT and BLE have dedicated pairing protocols and devices have to pair over BT and BLE to use both securely. In 2014, the Bluetooth standard (v4.2) addressed this usability issue by introducing Cross-Transport Key Derivation (CTKD). CTKD allows establishing BT and BLE pairing keys just by pairing over one of the two transports. While CTKD crosses the security boundary between BT and BLE, little is known about the internals of CTKD and its security implications. In this work, we present the first complete description of CTKD obtained by merging the scattered information from the Bluetooth standard with the results from our reverse-engineering experiments. Then, we perform a security evaluation of CTKD and uncover four cross-transport issues in its specification. We leverage these issues to design four standard-compliant attacks on CTKD enabling new ways to exploit Bluetooth (e.g., exploiting BT and BLE by targeting only one of the two). Our attacks work even if the strongest security mechanism for BT and BLE are in place, including Numeric Comparison and Secure Connections. They allow to impersonate, man-in-the-middle, and establish unintended sessions with arbitrary devices. We refer to our attacks as BLUR attacks, as they blur the security boundary between BT and BLE. We provide a low-cost implementation of the BLUR attacks and we successfully evaluate them on 14 devices with 16 unique Bluetooth chips from popular vendors. We discuss the attacks' root causes and present effective countermeasures to fix them. We disclosed our findings and countermeasures to the Bluetooth SIG in May 2020 (CVE-2020-15802), and we reported additional unmitigated issues in May 2021.