WhisperPair - Hijacking Bluetooth Accessories Using Google Fast Pair

Quite a scary and easy vulnerability to exploit.

Google Fast Pair enables one-tap pairing and account synchronisation across supported Bluetooth accessories. While Fast Pair has been adopted by many popular consumer brands, we discovered that many flagship products have not implemented Fast Pair correctly, introducing a flaw that allows an attacker to hijack devices and track victims using Google’s Find Hub network.

We introduce WhisperPair, a family of practical attacks that leverages a flaw in the Fast Pair implementation on flagship audio accessories. Our findings show how a small usability ‘add-on’ can introduce large-scale security and privacy risks for hundreds of millions of users.


The only way to fix this vulnerability is by installing a software update issued by the manufacturer of the accessory. Although many manufacturers have released patches for their impacted devices, software updates may not yet be available for every vulnerable device. We encourage researchers and users to verify patch availability directly with the manufacturer.

Is my device affected?


Asked on GOS’ forums if Google Fast Pair could potentially be disabled: WhisperPair - Hijacking Bluetooth Accessories Using Google Fast Pair - GrapheneOS Discussion Forum

EDIT: and nvm, because it’s a device and not phone thing. :joy:

3 Likes

Time to Switch to wired old-school IEMs I guess. :grin:

Eh, some of them look quite nice tho. :joy: