Researchers find vulnerabilities in Google Fast Pair that could let hackers control audio devices

Researchers find vulnerabilities in Google Fast Pair that could let hackers control audio devices — Cdn.mos.cms.futurecdn.net
Image source: Cdn.mos.cms.futurecdn.net

Pcgamer reports researchers at KU Leuven in Belgium analysed audio devices that use Google's Fast Pair Bluetooth system and found flaws that could let someone remotely control a device, tap its microphone, or track its location.

Fast Pair is designed to let compatible devices connect with one tap. Wired reported the KU Leuven team examined a range of audio devices and concluded the Bluetooth protocols used were vulnerable. Google told Wired that it "worked with these researchers to fix these vulnerabilities, and we have not seen evidence of any exploitation outside of this report’s lab setting."

Any remedy depends on end users updating firmware on their audio devices. Wired also reported the researchers discovered a bypass for the Find Hub fix, and there is still no word on a full solution yet.


Key Topics

Tech, Google Fast Pair, Ku Leuven, Bluetooth Protocols, Firmware Updates, Find Hub