BrokenMesh: New Attack Surfaces of Bluetooth Mesh

"Discover newly identified attack surfaces in Bluetooth mesh networking technology used in smart home devices, including zero-day vulnerabilities and remote code execution risks."

Key takeaways
  • Bluetooth mesh networking technology used in smart home devices
  • Node devices in the mesh network have a unique node ID and can subscribe to a group address
  • Devices communicate with each other through Bluetooth Low Energy (BLE) protocols
  • The network is built upon a mesh spec and allows for network communication and routing
  • The mesh nodes use a shared key (net key and APP key) for encryption and secure communication
  • Segmentation and reassembly mechanisms are used for transmitting large amounts of data
  • Fuzzing tool BleMeshFuzzer is used for vulnerabilities in the mesh network
  • Zero-day vulnerabilities found in network build stage, network control stage and on the Android and Linux platform
  • Fuzzer can hijack PC and R0 to obtain remote code execution (RCE) vulnerability
  • Devices can hijack and redirect messages causing segmentation and reassembly vulnerabilities