PROTECT YOUR DNA WITH QUANTUM TECHNOLOGY
Orgo-Life the new way to the future Advertising by AdpathwayOpen-access content Jack Loughran —
Tue 1 Jul 2025
Three vulnerabilities have been identified in Bluetooth headphones made by the likes of Sony, Jabra and Marshall that could allow attackers to eavesdrop on conversations or retrieve call history and stored contacts.
The headphones all use chipsets manufactured by Airoha – a firm that has become a large supplier in the Bluetooth audio space, especially for True Wireless Stereo earbuds.
Security researchers ERNW found that “powerful custom protocols” could be executed on the devices through attacks that give read and write access to either the RAM or the flash storage. Crucially, they can be executed by attackers who are not paired with the devices – they merely need to be within Bluetooth range.
ENRW said it did not want to “disclose too many details” including the specifics of the vulnerabilities as they may be difficult to patch by vendors.
It added: “One other issue we identified is that some vendors are not even aware that they are using an Airoha system-on-chip. They have outsourced parts of the development of their device, such as the Bluetooth module.”
One attack trialled by the firm allowed them to get a read on the currently playing media from the headphones via the RAM reading commands. The attacks did need to be tailored to each device individually depending on firmware version.
More concerningly, another attack would allow a hacker to establish a Bluetooth connection to vulnerable devices and listen to what their microphone is currently recording. This would result in the connection to existing devices being dropped, which at least alerts the user if they are actively using the device.
ENRW warned that even if patches are developed to improve the security of the devices, not all manufacturers push updates – especially for lower-cost or end-of-life products.
The models identified include Sony’s popular WF-1000XM3 and later revisions of Bose’s QuietComfort Earbuds and the JBL Live Buds 3. A full list of vulnerable devices identified so far can be seen in ENRW’s blog post.
Early versions of Bluetooth were highly vulnerable to attack, even through relatively rudimentary hacking attempts. Later versions – especially from version 2.1, which released in 2009 – made changes to pairing protocols that improved its security.