
Spy Attack Alert For Headphone Users — Is Yours On The At Risk List?
Hackers are, by their very nature, ingenious and inventive. It comes as part of the job description, and so this latest revelation should come as no surprise. After all, we've already seen hackers using printers, lightbulbs, vacuum cleaners and smartwatches in attack scenarios. Not to mention automatic password hacking machines and, of course, critical vulnerability exposure. And it's the latter, a vulnerability, that brings us nicely to the threat at hand. Researchers have found that more than two dozen earbuds, headphones, speakers and wireless mics from big-name brands are vulnerable to an attack that could see a skilled hacker successfully spying on the user, and even exfiltrating data from some smartphones. Here's what you need to know.
Listen Carefully — This Spy Threat Comes Via Your Audio Tech
There's something particularly insidious about a security threat that can exploit the technology we use to escape from the hubbub, to unwind, listen to music and podcasts, and spy on us. What's more, according to Dennis Heinze, a security analyst and researcher at ERNW, 'any vulnerable device can be compromised if the attacker is in Bluetooth range. That is the only precondition.' Now that, dear reader, is somewhat concerning.
A recently published security alert by security researchers at ERNW has identified several Bluetooth security vulnerabilities affecting audio devices, including those from well-known earphone and headphone brands that utilize Airoha Systems on a Chip.
Airoha is 'a large supplier in the Bluetooth audio space, especially in the area of True Wireless Stereo (TWS) earbuds,' Heinze said. While stating that ERNW does not want to disclose proof of concept code or too many technical details at this point, Heinze added that he wanted 'inform about these vulnerabilities, especially their impact and the difficulties around patching them.'
What ERNW and Heinze have said, however, is that, in most cases, 'these vulnerabilities allow attackers to fully take over the headphones via Bluetooth.' There is absolutely no authentication or pairing involved, as long as the hacker is within Bluetooth range, your headphones could be vulnerable. The researcher said that attackers could read and write to device RAM and flash memory, and could 'hijack established trust relationships with other devices, such as the phone paired to the headphones.'
CVE-2025-20700 (missing authentication for the Generic Attribute Profile service) and CVE-2025-20701 (missing authentication for Bluetooth Basic Rate/Enhanced Data Rate) are both high-risk vulnerabilities with a severity rating of 8.8/10. However, CVE-2025-20702, which Heinze described as presenting 'critical capabilities of a custom protocol,' has been given a critical rating, under the Common Vulnerability Scoring System, of 9.6/10.
The Threat From These Audio Spy Attacks Explained
Like many such reports, although the headline threat is indeed rather worrying, the real-world impact is likely to be significantly less, in my never humble opinion. 'One attack we implemented was reading out the currently playing media from the headphones via the RAM reading commands,' Heinze said. More worryingly, Heinze reported that exploiting the broken BR/EDR pairing was able to allow an attacker to listen to what the device microphone was recording. Again, in the real-world this wouldn't be very secret squirrel as the exploit would cause whatever the victim was listening to be dropped. 'For it to go unnoticed,' Heinze confirmed, 'headphones have to be turned on, but not in active use.'
And then we come to the smartphone issue. This exploits the trust between a Bluetooth device and the phone it has paired with. 'If an attacker can impersonate the headphones they could hijack this trust relationship in numerous ways,' Heinze said, including issuing commands to the smartphone in question. ERNW was able to demonstrate an exploit, using a full attack chain, that allowed for the calling of an arbitrary number from the smartphone. 'Under the right conditions,' Heinze warned, 'the established call allowed us to successfully eavesdrop on conversations or sounds within earshot of the phone.' It also allows for the extraction of call history and stored contacts data, Heinze said.
Most people do not need to panic, with journalists, diplomats, political dissidents, people in sensitive industries and VIPs under surveillance being named as the most likely targets of any attacks. The kind of people who should know not to use Bluetooth headphones. Everyone, Heinze said, should patch their firmware as soon as one becomes available. In the meantime, at-risk users might want to wait for a patch until they use their headphones again. 'Please ensure that you also remove the pairing between the headphones and your mobile phone,' Heinze added.
'Ensuring complete trust in software and the technologies it supports is incredibly challenging,' Boris Cipot, a senior security engineer at Black Duck, said. With every new advancement comes the risk of unknown vulnerabilities, of course, flaws that may only be uncovered later by dedicated security researchers, Cipot warned.
'What matters most now is delivering timely updates and patches so users can operate their devices without worrying about being compromised,' Cipot said; 'Vendors using Airoha TWS technology must ensure customers receive these critical updates seamlessly via an automated upgrade process. Relying on users to manually update their devices simply isn't effective.'
The Spy Attack Headphones At Risk List
Heinze has said that Airoha has fixed the vulnerabilities in the software development kit and supplied a new version to device manufacturers in the first week of June. The manufacturers now have to build and distribute firmware updates, so expect to see these soon if they have not dropped already.
I have approached Airoha for a statement
'We can confirm that the issues are prevalent in many entry-level and flagship models,' Heinze said, adding that ERNW confirmed Beyerdynamic, Marshall and Sony as impacted vendors. 'We know of many more devices using the chips that we assume to be vulnerable, too,' Heinze concluded.
The following devices were listed as being vulnerable by the ERNW researchers:
A Jabra spokesperson provided the following statement:
'At Jabra we are aware of the recently discovered Bluetooth vulnerability for Airoha chipset devices, which include the Jabra Elte 8 and Elite 10 earbuds. We have taken steps immediately to work on a firmware update to include the Airoha security patch and this will be rolled out very shortly. Jabra continues to support the Elite 8 and 10 earbuds despite having stopped the production of the Elite product line last year. We want to emphasize that no other Jabra audio devices or headsets within our portfolio are affected by this vulnerability.'
I have contacted all the vendors listed above for a statement regarding the spy exploit research and will update this article when I have further information.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
a minute ago
- Yahoo
Apple, Google Under Fire: UK Regulators Launch Bold Crackdown on Browser Monopoly
July 23 Britain's Competition and Markets Authority plans to designate Apple (NASDAQ:AAPL) and Google (NASDAQ:GOOGL) with strategic market status over their mobile ecosystems. The CMA's inquiry found markets relating to mobile internet browsers were not working well for consumers or businesses. Apple's Safari and Google's Chrome together dominate browsing on iPhones and Android handsets. A strategic market status designation would allow the CMA to impose interventions requiring firms to follow specific behaviours to protect fair competition. CMA chief Sarah Cardell said the measures would help UK app developers remain at the forefront of innovation and ensure users receive a world?class experience. The regulator highlighted opportunities for more innovation and choice. A final decision is due by Oct. 22, with roadmaps published for potential next steps. Google's senior director for competition, Oliver Bethell, called the move disappointing and unwarranted and warned against rules that could impede growth in the UK. Apple said it was concerned the proposed steps might undermine the privacy and security protections users expect. This article first appeared on GuruFocus. Error while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data
Yahoo
a minute ago
- Yahoo
SentinelOne (S) Partners with Abstract to Boost AI-Powered Threat Detection
SentinelOne, Inc. (NYSE:S) is one of the top AI stocks with huge upside potential. On July 17, the company announced a strategic partnership with Abstract Security to integrate its Singularity™ Platform with Abstract's real-time data pipeline, aimed at transforming cybersecurity operations. This collaboration enhances threat detection, reduces alert noise, and streamlines operations using AI-driven analytics, while offering no-code integration and scalable migration for organizations looking to modernize their security stack. Den Rise/ By enabling data filtering before ingestion, the joint solution cuts storage and processing costs while improving detection accuracy. Abstract's standardized feeds ensure high-quality data inputs for SentinelOne's AI models, positioning the company more competitively in the SIEM market and helping enterprises shift away from outdated infrastructure with greater confidence and security agility. SentinelOne, Inc. (NYSE:S) is a global cybersecurity company that provides AI-powered solutions to detect, prevent, and respond to cyber threats across endpoints, cloud environments, and identity systems. Its flagship Singularity Platform delivers autonomous protection and includes features like Purple AI, a generative AI security agent, along with tools for SIEM, vulnerability management, and threat intelligence. While we acknowledge the potential of S as an investment, we believe certain AI stocks offer greater upside potential and carry less downside risk. If you're looking for an extremely undervalued AI stock that also stands to benefit significantly from Trump-era tariffs and the onshoring trend, see our free report on the best short-term AI stock. READ NEXT: 10 Best Chemical Stocks to Buy According to Billionaires and 7 Most Undervalued Pot Stocks To Buy According To Analysts. Disclosure: None. This article is originally published at Insider Monkey. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
a minute ago
- Yahoo
emnify Wins Platinum Award for eSIM Management Platform Innovation at Juniper Awards 2025
Recognized for Zero-Touch, Scalable eSIM Provisioning via MDM BERLIN, July 23, 2025--(BUSINESS WIRE)--emnify, a global leader in IoT connectivity, has received the Platinum Award for eSIM Management Platform Innovation at the 2025 Juniper Research Future Digital Awards. This marks the company's second major recognition this year for its breakthrough in eSIM technology, following its win as eSIM Provider of the Year at the MVNOs World Awards 2025 in May. Together, these awards highlight emnify's pioneering role in simplifying how businesses manage Consumer eSIMs at scale. Juniper Research, a leading technology analyst firm, honors innovators reshaping the digital landscape. emnify was recognized for its Consumer eSIM provisioning via MDM, a solution that enables remote, zero-touch provisioning of SGP.22 eSIM profiles for consumer-connected devices such as Apple iPads. By integrating with MDM (Mobile Device Management) platforms, emnify allows enterprises to automate deployments, enforce policies and manage connectivity centrally, removing the need for QR codes or physical SIM handling. "This award is a powerful testament to our strong commitment to innovation and excellence," says Frank Stoecker, CEO of emnify. "It reflects the strength of our world-class engineering and development teams whose pursuit of cutting-edge solutions continues to redefine connectivity, enabling faster device rollouts, centralized eSIM management and greater operational control for businesses deploying connected devices at scale." Tens of thousands of connected devices across industries now rely on emnify's market-first eSIM provisioning via MDM, a solution that replaces manual SIM handling with zero-touch policy-driven activation. By integrating directly with MDM systems, it enables automatic profile provisioning while enforcing security policies like DNS filtering and roaming limits. One example is Discover Airlines, which uses emnify to connect over 1,800 Electronic Flight Bag (EFB) devices in more than 50 countries. With remote eSIM provisioning, devices arrive connectivity-ready—no QR codes, no manual setup and no crew action required. "eSIM provisioning has fundamentally changed how we operate," said Jonas Becker, EFB Administrator at Discover Airlines. "What once took days of coordination now happens automatically. Devices arrive ready to use." By supporting SGP.02 (M2M), SGP.22 (consumer) and soon SGP.32 (IoT) profiles in a single platform, emnify enables future-proof deployments and sets a new standard for scalable, secure enterprise-ready connectivity. About emnify emnify is the leading IoT connectivity partner to the innovators building our connected world. Founded in 2014, emnify developed the industry's first cloud-native, global connectivity - the SuperNetwork. Its unique approach to IoT connectivity, coupled with a comprehensive connectivity management platform and services, ensures seamless data exchange between devices, cloud environments and IoT applications. Headquartered in Berlin, with offices in the US, Brazil and the Philippines, emnify is the global provider of IoT connectivity for thousands of enterprises worldwide. The emnify solution connects millions of devices across all industries including fleet management, consumer electronics, logistics, agriculture, environmental monitoring, smart buildings, retail and more. To learn more about how emnify can support your transition or optimization of future eSIM deployments get in touch at . View source version on Contacts For more information, please contact: Sara Debevec Senior Content