CVE-2024-27867
CVE-2024-27867 is an authentication issue affecting AirPods and Beats headphones, potentially allowing unauthorized access via Bluetooth spoofing. This vulnerability is fixed in specific firmware updates.
CVE-2024-27867 describes a security flaw where an attacker within Bluetooth range could spoof a previously paired device, gaining unauthorized access to your AirPods or Beats headphones. Although the CVSS score is relatively low (3.3), the SOCRadar Vulnerability Risk Score (SVRS) is 44, indicating a moderate level of risk. The fix is available in AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8. Users should promptly update their firmware to mitigate the risk of unauthorized Bluetooth connections. While not critical based on SVRS, the "In The Wild" tag indicates active exploitation, making patching a priority to prevent potential eavesdropping or other malicious activities on compromised devices.
Description:
CVE-2024-27867 is an authentication vulnerability in AirPods and Beats headphones that allows an attacker within Bluetooth range to spoof the intended source device and gain access to the headphones. The vulnerability has a CVSS score of 0, indicating a low severity. However, SOCRadar's SVRS assigns it a score of 40, indicating a moderate risk.
Key Insights:
- Exploitation in the Wild: This vulnerability is actively exploited by hackers, making it a critical threat to users.
- Threat Actors: Specific threat actors or APT groups exploiting this vulnerability have not been identified.
- CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
- Impact: Successful exploitation of this vulnerability could allow an attacker to gain access to the user's headphones, potentially eavesdropping on conversations or stealing sensitive data.
Mitigation Strategies:
- Update Firmware: Install the latest firmware updates (6A326 for AirPods, 6F8 for AirPods and Beats) to patch the vulnerability.
- Disable Bluetooth When Not in Use: Turn off Bluetooth when not using the headphones to reduce the risk of exploitation.
- Use Strong Passwords: Set strong passwords for your Apple devices to prevent unauthorized access.
- Be Aware of Your Surroundings: Be cautious when using your headphones in public places, as attackers may be present within Bluetooth range.
Additional Information:
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.