WhisperPair Bluetooth Vulnerability Enables Hijacking of Accessories

Related

ApolloMD Data Breach Impacts More Than 620,000

What happened A cyberattack on the Georgia-based healthcare provider ApolloMD...

Atlas Air Ransomware Breach Allegedly Exposes Boeing Technical Data

What happened Attackers claiming affiliation with the Everest ransomware gang...

Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools in Attacks

What happened Security researchers have documented threat actors abusing legitimate...

Palo Alto Networks Firewall Reboot Loop Flaw Affects Next-Generation Devices

What happened A software flaw in Palo Alto Networks next-generation...

Promptware Leveraged Google Calendar Invites in Credential Harvesting Campaign

What happened Security researchers from ReversingLabs have uncovered a malicious...

Share

What happened

The WhisperPair vulnerability (CVE-2025-36911) in Google’s Fast Pair protocol allows attackers to hijack Bluetooth accessories — including earbuds, speakers, and headphones — without user consent. Researchers at KU Leuven uncovered that many flagship devices from major brands (Sony, Anker, Jabra, Logitech, Xiaomi, and others) fail to enforce required pairing authorization checks, enabling unauthorized devices to establish pairings in close proximity (up to ~14 meters) without user interaction. Once paired, attackers can play audio at high volume or record audio via built-in microphones, and even link accessories to their own accounts via Google’s Find Hub network, potentially enabling unwanted tracking. The flaw affects Bluetooth hardware itself, making mitigation dependent on firmware updates from device manufacturers. 

Who is affected

Consumers and enterprises using Bluetooth accessories from affected manufacturers are indirectly exposed; threat is physical-proximity dependent and does not require target device compromise.

Why CISOs should care

Bluetooth pairing flaws can lead to unauthorized accessory control, eavesdropping, and privacy breaches around corporate devices, potentially undermining BYOD and wireless security policies.

3 practical actions

  • Track firmware advisories: Ensure accessory vendors publish patches and update devices promptly.
  • Limit accessory use in sensitive areas: Reduce Bluetooth pairing in high-risk or confidential spaces.
  • Monitor for rogue pairings: Detect unexpected device pair events in managed environments.