Thursday, March 12, 2026

"A Bugging Device in My Earphones"... Hacking Concerns Raised for 29 Popular Headsets from Sony, Marshall, and Others [Global IT Issue]

Input
2026-01-06 09:13:11
Updated
2026-01-06 09:13:11
A model wearing the Sony WH-1000XM6. Photo: Sony official website

Security vulnerabilities have been discovered in popular wireless headsets and earphones from well-known brands, raising alarm over user safety. Experts warn that hackers could connect to smartphones without permission, eavesdrop on nearby conversations, or remotely control devices to steal personal data.
According to Newsis, on the 6th, the German security research institute ERNW identified vulnerabilities in Bluetooth chipsets produced by Airoha Technology of Taiwan.
ERNW is recognized as a reputable institution, having presented its research at Black Hat, the world’s largest security conference, and participated in security projects for the Federal Office for Information Security (BSI) in Germany.
The institute reported discovering three vulnerabilities—CVE-2025-20700, CVE-2025-20701, and CVE-2025-20702—in the RACE Bluetooth protocol developed by Airoha Technology. This protocol serves as a dedicated management channel for manufacturers to inspect devices or update firmware.
ERNW expressed concern that this channel can be accessed without even minimal security authentication. The institute also warned that the combination of these three vulnerabilities could pose a serious threat.
Major devices using Airoha Technology's chipset include 14 models released last year, such as Sony's flagship Sony WH-1000XM6, six Marshall devices including the Marshall Major V, and the JBL Live Buds 3, totaling 29 affected products.
According to the ERNW report, hackers can use specially crafted attack tools to connect to headsets within a 10-meter range without a password (pairing). Once connected, they can access the device’s internal memory and steal the Bluetooth link key used to connect to smartphones.
If a hacker’s device impersonates a wireless headset or earphones using the stolen key, the user's smartphone will mistakenly recognize it as a previously connected device and establish a Bluetooth connection.
The researchers referred to this method as 'headphone jacking.'
In such cases, hackers could view call histories, steal contacts, and use voice assistants like Google Assistant or Apple Siri to make calls or send messages without the user’s consent.
The vulnerability was first reported in June last year. At the end of December, the research team disclosed all technical details and the attack tools used for research purposes in the public interest.
Although Airoha Technology, the chipset manufacturer, has already distributed a software development kit (SDK) with security patches, major manufacturers have reportedly been slow to respond or have not replied to the vulnerability reports.
The researchers advised users of affected headsets and earphones to check for and install the latest firmware updates. They cautioned that failing to update could leave devices vulnerable to hacking, urging users to exercise particular caution.
y27k@fnnews.com Seo Yoon-kyung Reporter