The Rolling Proximity Identifier used in the Apple/Google Exposure Notification API beta through 2020-05-29 enables attackers to circumvent Bluetooth Smart Privacy because there is a secondary temporary UID. An attacker with access to Beacon or IoT networks can seamlessly track individual device movement via a Bluetooth LE discovery mechanism.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/normanluhrmann/infosec/raw/master/exposure-notification-vulnerability-20200611.pdf | exploit third party advisory technical description |
https://blog.google/documents/70/Exposure_Notification_-_Bluetooth_Specification_v1.2.2.pdf | third party advisory |
https://github.com/normanluhrmann/infosec/raw/master/exposure-notification-vulnerability-20200616.pdf | exploit third party advisory technical description |
https://github.com/normanluhrmann/infosec/raw/master/exposure-notification-vulnerability-20200616-2.pdf | exploit third party advisory technical description |
https://github.com/google/exposure-notifications-internals/commit/8f751a666697c3cae0a56ae3464c2c6cbe31b69e | third party advisory patch |
https://github.com/google/exposure-notifications-internals/commit/8f751a666697 | third party advisory patch |