background image

Risks of using Bluetooth technology on wireless devices

3

The wireless industry considers that Bluetooth® enabled devices have the following potential areas of vulnerability:

Users with malicious intent can obtain confidential data from Bluetooth enabled devices without the knowledge or
consent of the authorized users.

A previously trusted (or paired) source that has been removed from the Trusted list can access the memory contents of
some Bluetooth enabled devices.

Users with malicious intent can gain access to higher-level commands and to voice, data, and messaging channels.

Security threats to Bluetooth wireless technology can be user based or device based.

Type of threat

Description

Examples

user based

User-based threats occur when users change settings or
perform (or fail to perform) actions that leave their devices
vulnerable or open to attacks.

bluejacking

device based

Device-based threats are the result of incorrect implementation
of Bluetooth wireless technology on devices, which leave the
devices vulnerable or open to attacks.

bluesnarfing and
bluebugging

Any Bluetooth enabled device is at risk for attack when all of the following conditions are present:

The Bluetooth wireless transceiver is turned on.

The device is set to use discoverable (visible) mode.

The device is physically located within range of a user with malicious intent.

Bluejacking

Bluejacking is a user-based threat that occurs when users with malicious intent send text messages anonymously to
Bluetooth® enabled devices that are set to use discoverable mode and are physically located within 10 m of the attacking
devices. Users with malicious intent can target individuals or they can broadcast anonymous messages to all discoverable
devices in the area. Bluetooth enabled phones, personal device assistants, and laptops can search for other devices within
a short range, so users with malicious intent who are located in crowded public areas can send anonymous messages easily
and without detection.

Bluesnarfing

Bluesnarfing is a device-based threat that occurs when device manufacturers implement the specification for Bluetooth®
technology incorrectly, allowing users with malicious intent to use Bluetooth technology to connect to devices without
notifying the authorized users, and access device information without the knowledge or consent of the authorized users.

Security Technical Overview

Risks of using Bluetooth technology on wireless devices

7

Summary of Contents for ENTERPRISE SOLUTION DEVICES TE

Page 1: ...Security Technical Overview BlackBerry Devices with Bluetooth Technology...

Page 2: ...SWDT391201 391201 0613044539 001...

Page 3: ...ejacking 7 Bluesnarfing 7 Bluebugging 8 4 Managing Bluetooth enabled BlackBerry devices 9 Bluetooth technology security measures on BlackBerry devices 9 Using IT policy to manage Bluetooth technology...

Page 4: ...Security Technical Overview BlackBerry Enterprise Solution security 2...

Page 5: ...ss solutions Criteria Description confidentiality TheBlackBerryEnterpriseSolutionusesencryptiontomakesurethatonlytheintended message recipients can view the contents of the message integrity The Black...

Page 6: ...Security Technical Overview Bluetooth technology 4...

Page 7: ...that BlackBerry devices support Bluetooth enabled BlackBerry devices currently support Bluetooth profiles and provide specific IT policy rules to control their use Profile Description A2DP This profi...

Page 8: ...he BlackBerry device from using this profile SPP This profile provides procedures that describe how to configure serial connections between a BlackBerry device and a Bluetooth enabled peripheral that...

Page 9: ...k when all of the following conditions are present The Bluetooth wireless transceiver is turned on The device is set to use discoverable visible mode The device is physically located within range of a...

Page 10: ...eventing users with malicious intent from using the OBEX implementation to access core BlackBerry device data Bluebugging Bluebugging is a device based threat that occurs when device manufacturers imp...

Page 11: ...sing CHAP authentication on all Bluetooth serial connections to computers flashing the LED light when connected to another Bluetooth enabled device prompting users to type their BlackBerry device pass...

Page 12: ...ecret key to complete a connection or pairing with another Bluetooth enabled device A user s passkey must be between one and 16 characters long and it is dependent on the target peripheral device User...

Page 13: ...es that control the use of Bluetooth wireless technology on BlackBerry devices are available in BlackBerry Enterprise Server version 4 0 and later These versions of the BlackBerry Enterprise Server su...

Page 14: ...h supported Bluetooth enabled devices Default setting The default setting is False Minimum requirements Java based BlackBerry device BlackBerry Device Software Version 4 1 BlackBerry Enterprise Server...

Page 15: ...logy is turned on when the BlackBerry device receives this IT policy rule the BlackBerry device must be reset for the change to take effect Minimum requirement Java based BlackBerry device BlackBerry...

Page 16: ...Mode IT policy rule Description This rule specifies whether to prevent BlackBerry device users from making their BlackBerry devices discoverable A BlackBerry device that is discoverable can be found...

Page 17: ...on 3 8 BlackBerry Enterprise Server Version 4 0 BlackBerry Connect Transport Stack Version 4 0 Exceptions The BlackBerry Enterprise Server for Novell GroupWise supports this IT policy rule in BlackBer...

Page 18: ...sed BlackBerry device BlackBerry Device Software Version 3 8 BlackBerry Enterprise Server Version 4 0 BlackBerry Connect Transport Stack Version 4 0 Exceptions The BlackBerry Enterprise Server for Nov...

Page 19: ...are Version 4 1 BlackBerry Enterprise Server Version 4 0 SP3 Force CHAP Authentication on Bluetooth Link IT Policy rule Description This rule specifies whether the BlackBerry device must use CHAP auth...

Page 20: ...bytes that the BlackBerry device uses to encrypt Bluetooth connections Default setting The default setting is 1 byte Minimum requirements Java based BlackBerry device BlackBerry Device Software Versio...

Page 21: ...lackBerry device password before the BlackBerry device can be discovered by Bluetooth enabled devices Default setting The default setting is False Dependencies The BlackBerry device uses this IT polic...

Page 22: ...th unknown Bluetooth enabled devices When pairing a BlackBerry device with another Bluetooth enabled device set the Discoverable option to 2 Minutes The BlackBerry device is discoverable for two minut...

Page 23: ...mote Control Profile DUN Dial up Networking GSM Global System for Mobile commmunications HFP Hands Free Profile HSP Headset Profile LED light emitting diode OBEX Object Exchange SIM Subscriber Identit...

Page 24: ...Security Technical Overview Legal notice 22...

Page 25: ...n that is contained in this documentation however RIM makes no commitment to provide any such changes updates enhancements or other additions to this documentation to you in a timely manner or at all...

Page 26: ...RVIVE A FUNDAMENTAL BREACH OR BREACHES OR THE FAILURE OF THE ESSENTIAL PURPOSE OF THIS AGREEMENT OR OF ANY REMEDY CONTAINED HEREIN AND B TO RIM AND ITS AFFILIATED COMPANIES THEIR SUCCESSORS ASSIGNS AG...

Page 27: ...TO SUPERSEDE ANY EXPRESS WRITTEN AGREEMENTS OR WARRANTIES PROVIDED BY RIM FOR PORTIONS OF ANY RIM PRODUCT OR SERVICE OTHER THAN THIS DOCUMENTATION Research In Motion Limited 295 Phillip Street Waterl...

Reviews: