Home / Series / Chaos Communication Congress / Aired Order / Season 39 / Episode 42

Bluetooth Headphone Jacking: A Key to Your Phone

Bluetooth headphones and earbuds are everywhere, and we were wondering what attackers could abuse them for. Sure, they can probably do things like finding out what the person is currently listening to. But what else? During our research we discovered three vulnerabilities (CVE-2025-20700, CVE-2025-20701, CVE-2025-20702) in popular Bluetooth audio chips developed by Airoha. These chips are used by many popular device manufacturers in numerous Bluetooth headphones and earbuds. The identified vulnerabilities may allow a complete device compromise. We demonstrate the immediate impact using a pair of current-generation headphones. We also demonstrate how a compromised Bluetooth peripheral can be abused to attack paired devices, like smartphones, due to their trust relationship with the peripheral. This presentation will give an overview over the vulnerabilities and a demonstration and discussion of their impact.

English
  • Originally Aired December 27, 2025
  • Runtime 60 minutes
  • Production Code 1491
  • Created December 22, 2025 by
    r4m3u5
  • Modified December 28, 2025 by
    r4m3u5