WhisperPair Bluetooth Vulnerability Enables Hijacking of Accessories

Related

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

The WhisperPair vulnerability (CVE-2025-36911) in Google’s Fast Pair protocol allows attackers to hijack Bluetooth accessories — including earbuds, speakers, and headphones — without user consent. Researchers at KU Leuven uncovered that many flagship devices from major brands (Sony, Anker, Jabra, Logitech, Xiaomi, and others) fail to enforce required pairing authorization checks, enabling unauthorized devices to establish pairings in close proximity (up to ~14 meters) without user interaction. Once paired, attackers can play audio at high volume or record audio via built-in microphones, and even link accessories to their own accounts via Google’s Find Hub network, potentially enabling unwanted tracking. The flaw affects Bluetooth hardware itself, making mitigation dependent on firmware updates from device manufacturers. 

Who is affected

Consumers and enterprises using Bluetooth accessories from affected manufacturers are indirectly exposed; threat is physical-proximity dependent and does not require target device compromise.

Why CISOs should care

Bluetooth pairing flaws can lead to unauthorized accessory control, eavesdropping, and privacy breaches around corporate devices, potentially undermining BYOD and wireless security policies.

3 practical actions

  • Track firmware advisories: Ensure accessory vendors publish patches and update devices promptly.
  • Limit accessory use in sensitive areas: Reduce Bluetooth pairing in high-risk or confidential spaces.
  • Monitor for rogue pairings: Detect unexpected device pair events in managed environments.