Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine

Black Hat Asia 2025 · Day 1 · Briefings

This talk, presented by Leong, Wa, and Oliver Dong from SRAD, introduces a groundbreaking methodology for discovering Bluetooth vulnerabilities by deconstructing and manipulating the underlying protocol state machines. Moving beyond the limitations of traditional fuzzing techniques, the researchers demonstrate how intentionally disrupting the expected flow of Bluetooth messages can uncover deep-seated, high-impact security flaws. The presentation highlights the critical shift in vulnerability discovery, emphasizing that modern Bluetooth stacks are resilient to simple packet mutations, necessitating a more sophisticated approach focused on state transitions and inter-protocol interactions.

AI review

This talk delivers a much-needed paradigm shift in Bluetooth vulnerability discovery, moving past the increasingly useless traditional fuzzing. The SRAD team has demonstrated a sophisticated, state-aware methodology that exploits protocol state machine disruptions, uncovering severe, often unauthenticated, remote vulnerabilities in critical devices from smartphones to automotive IVI systems. This is real research with high impact and requires genuine skill.

Watch on YouTube