(All) Your APs (Are) Belong to Us, by Ben Seri & Dor Zusman
BleedingBit and IOT devices, by Ron Chestang
Connectivity drives innovation in recent years, and with good cause. Interacting with the world around us with no wires attached is obviously more convenient. To make the most of such innovations, enterprise Wi-Fi access points are increasingly embedding BLE (Bluetooth Low Energy) chips. While these chips provide new features, they also introduce risks that create a new network attack surface.
In this talk, we will demonstrate BLEEDINGBIT, two zero-day vulnerabilities in Texas Instruments (TI) BLE chips used in Cisco, Meraki, and Aruba wireless access points, that allow an unauthenticated attacker to penetrate an enterprise network over the air. Using BLEEDINGBIT, an attacker first achieves RCE on the BLE chip, and then leverages his position to compromise the main OS of the access point and gain full control over it. Once an access point has been compromised, an attacker can read all traffic going through the access point, distribute malware, and even move laterally between network segments.
Vulnerabilities such as BLEEDINGBIT have a frightening potential, as the use of BLE is skyrocketing, driven by the rise of IoT devices. Some of the recent examples of this trend are secure 2FA keys such as Google's Titan Security Key, that nowadays also come with a cabless version, and Apple's new "Find My" feature, that turns all Apple devices into a collective hive-mind that tracks the whereabouts of other neighboring Apple devices that sends out a unique BLE beacon. Even implanted medical devices, such as Pacemakers, have started using BLE as their primary channel for telemetry and control. A BLEEDINGBIT-type attack against any of these devices would come out of thin air, bypassing existing security controls, and catching these organizations unprotected.