The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/93874 | Third Party Advisory VDB Entry |
https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/ | Exploit Technical Description Third Party Advisory |
https://www.kb.cert.org/vuls/id/617567 | Third Party Advisory US Government Resource |
https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: certcc
Published: 2018-07-06T21:00:00
Updated: 2018-07-07T09:57:01
Reserved: 2016-08-03T00:00:00
Link: CVE-2016-6539
JSON object: View
NVD Information
Status : Modified
Published: 2018-07-06T21:29:00.280
Modified: 2019-10-09T23:19:12.830
Link: CVE-2016-6539
JSON object: View
Redhat Information
No data.
CWE