background image

Risks of using Bluetooth technology on wireless devices

3

The wireless industry considers that Bluetooth® enabled devices have the following potential areas of vulnerability:

Users with malicious intent can obtain confidential data from Bluetooth enabled devices without the knowledge or
consent of the authorized users.

A previously trusted (or paired) source that has been removed from the Trusted list can access the memory contents of
some Bluetooth enabled devices.

Users with malicious intent can gain access to higher-level commands and to voice, data, and messaging channels.

Security threats to Bluetooth wireless technology can be user based or device based.

Type of threat

Description

Examples

user based

User-based threats occur when users change settings or
perform (or fail to perform) actions that leave their devices
vulnerable or open to attacks.

bluejacking

device based

Device-based threats are the result of incorrect implementation
of Bluetooth wireless technology on devices, which leave the
devices vulnerable or open to attacks.

bluesnarfing and
bluebugging

Any Bluetooth enabled device is at risk for attack when all of the following conditions are present:

The Bluetooth wireless transceiver is turned on.

The device is set to use discoverable (visible) mode.

The device is physically located within range of a user with malicious intent.

Bluejacking

Bluejacking is a user-based threat that occurs when users with malicious intent send text messages anonymously to
Bluetooth® enabled devices that are set to use discoverable mode and are physically located within 10 m of the attacking
devices. Users with malicious intent can target individuals or they can broadcast anonymous messages to all discoverable
devices in the area. Bluetooth enabled phones, personal device assistants, and laptops can search for other devices within
a short range, so users with malicious intent who are located in crowded public areas can send anonymous messages easily
and without detection.

Bluesnarfing

Bluesnarfing is a device-based threat that occurs when device manufacturers implement the specification for Bluetooth®
technology incorrectly, allowing users with malicious intent to use Bluetooth technology to connect to devices without
notifying the authorized users, and access device information without the knowledge or consent of the authorized users.

Security Technical Overview

Risks of using Bluetooth technology on wireless devices

7

Содержание ENTERPRISE SOLUTION DEVICES TE

Страница 1: ...Security Technical Overview BlackBerry Devices with Bluetooth Technology...

Страница 2: ...SWDT391201 391201 0613044539 001...

Страница 3: ...ejacking 7 Bluesnarfing 7 Bluebugging 8 4 Managing Bluetooth enabled BlackBerry devices 9 Bluetooth technology security measures on BlackBerry devices 9 Using IT policy to manage Bluetooth technology...

Страница 4: ...Security Technical Overview BlackBerry Enterprise Solution security 2...

Страница 5: ...ss solutions Criteria Description confidentiality TheBlackBerryEnterpriseSolutionusesencryptiontomakesurethatonlytheintended message recipients can view the contents of the message integrity The Black...

Страница 6: ...Security Technical Overview Bluetooth technology 4...

Страница 7: ...that BlackBerry devices support Bluetooth enabled BlackBerry devices currently support Bluetooth profiles and provide specific IT policy rules to control their use Profile Description A2DP This profi...

Страница 8: ...he BlackBerry device from using this profile SPP This profile provides procedures that describe how to configure serial connections between a BlackBerry device and a Bluetooth enabled peripheral that...

Страница 9: ...k when all of the following conditions are present The Bluetooth wireless transceiver is turned on The device is set to use discoverable visible mode The device is physically located within range of a...

Страница 10: ...eventing users with malicious intent from using the OBEX implementation to access core BlackBerry device data Bluebugging Bluebugging is a device based threat that occurs when device manufacturers imp...

Страница 11: ...sing CHAP authentication on all Bluetooth serial connections to computers flashing the LED light when connected to another Bluetooth enabled device prompting users to type their BlackBerry device pass...

Страница 12: ...ecret key to complete a connection or pairing with another Bluetooth enabled device A user s passkey must be between one and 16 characters long and it is dependent on the target peripheral device User...

Страница 13: ...es that control the use of Bluetooth wireless technology on BlackBerry devices are available in BlackBerry Enterprise Server version 4 0 and later These versions of the BlackBerry Enterprise Server su...

Страница 14: ...h supported Bluetooth enabled devices Default setting The default setting is False Minimum requirements Java based BlackBerry device BlackBerry Device Software Version 4 1 BlackBerry Enterprise Server...

Страница 15: ...logy is turned on when the BlackBerry device receives this IT policy rule the BlackBerry device must be reset for the change to take effect Minimum requirement Java based BlackBerry device BlackBerry...

Страница 16: ...Mode IT policy rule Description This rule specifies whether to prevent BlackBerry device users from making their BlackBerry devices discoverable A BlackBerry device that is discoverable can be found...

Страница 17: ...on 3 8 BlackBerry Enterprise Server Version 4 0 BlackBerry Connect Transport Stack Version 4 0 Exceptions The BlackBerry Enterprise Server for Novell GroupWise supports this IT policy rule in BlackBer...

Страница 18: ...sed BlackBerry device BlackBerry Device Software Version 3 8 BlackBerry Enterprise Server Version 4 0 BlackBerry Connect Transport Stack Version 4 0 Exceptions The BlackBerry Enterprise Server for Nov...

Страница 19: ...are Version 4 1 BlackBerry Enterprise Server Version 4 0 SP3 Force CHAP Authentication on Bluetooth Link IT Policy rule Description This rule specifies whether the BlackBerry device must use CHAP auth...

Страница 20: ...bytes that the BlackBerry device uses to encrypt Bluetooth connections Default setting The default setting is 1 byte Minimum requirements Java based BlackBerry device BlackBerry Device Software Versio...

Страница 21: ...lackBerry device password before the BlackBerry device can be discovered by Bluetooth enabled devices Default setting The default setting is False Dependencies The BlackBerry device uses this IT polic...

Страница 22: ...th unknown Bluetooth enabled devices When pairing a BlackBerry device with another Bluetooth enabled device set the Discoverable option to 2 Minutes The BlackBerry device is discoverable for two minut...

Страница 23: ...mote Control Profile DUN Dial up Networking GSM Global System for Mobile commmunications HFP Hands Free Profile HSP Headset Profile LED light emitting diode OBEX Object Exchange SIM Subscriber Identit...

Страница 24: ...Security Technical Overview Legal notice 22...

Страница 25: ...n that is contained in this documentation however RIM makes no commitment to provide any such changes updates enhancements or other additions to this documentation to you in a timely manner or at all...

Страница 26: ...RVIVE A FUNDAMENTAL BREACH OR BREACHES OR THE FAILURE OF THE ESSENTIAL PURPOSE OF THIS AGREEMENT OR OF ANY REMEDY CONTAINED HEREIN AND B TO RIM AND ITS AFFILIATED COMPANIES THEIR SUCCESSORS ASSIGNS AG...

Страница 27: ...TO SUPERSEDE ANY EXPRESS WRITTEN AGREEMENTS OR WARRANTIES PROVIDED BY RIM FOR PORTIONS OF ANY RIM PRODUCT OR SERVICE OTHER THAN THIS DOCUMENTATION Research In Motion Limited 295 Phillip Street Waterl...

Отзывы: