White Paper:
Understanding Common BLE Attacks


Since its introduction in 2010, Bluetooth Low Energy (BLE) has become ubiquitous and is growing by over 8 Billion units per year. The success is driven by several factors including extremely low power, low cost, and the addition to every cell phone on the planet. This has made it the ideal command and control radio for IoT and device to device control communications. Unfortunately, BLE has always struggled with security and there are more vulnerabilities being announced every day. While the Bluetooth standards body has driven significant improvements in security over the last four years, holes remain. This paper will discuss some of the more common types of exploits.