The Trackr device ID is constructed of a manufacturer identifier of four zeroes followed by the BLE MAC address in reverse. The MAC address can be obtained by being in close proximity to the Bluetooth device, effectively exposing the device ID. The ID can be used to track devices. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.
References
Link Resource
http://www.securityfocus.com/bid/93874 Third Party Advisory VDB Entry
https://blog.rapid7.com/2016/10/25/multiple-bluetooth-low-energy-ble-tracker-vulnerabilities/ Exploit Technical Description Third Party Advisory
https://www.kb.cert.org/vuls/id/617567 Third Party Advisory US Government Resource
https://www.kb.cert.org/vuls/id/TNOY-AF3KCZ Third Party Advisory US Government Resource
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: certcc

Published: 2018-07-06T21:00:00

Updated: 2018-07-07T09:57:01

Reserved: 2016-08-03T00:00:00


Link: CVE-2016-6539

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2018-07-06T21:29:00.280

Modified: 2019-10-09T23:19:12.830


Link: CVE-2016-6539

JSON object: View

cve-icon Redhat Information

No data.

CWE