1 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Researchers discovered that the nRF52832 Bluetooth chip leaks its AES keys through radio frequency signals. They successfully recovered the 128-bit key from a meter away, raising concerns for security in industries using this chip, especially automotive. This method could potentially apply to other BLE chips as well.
If you do, here's more
Security researchers Yanning Ji, Elena Dubrova, and Ruize Wang revealed a significant vulnerability in the nRF52832 Bluetooth Low Energy (BLE) chip from Nordic Semiconductor. Their research details a remote side-channel attack that exploits radio frequency signals to extract AES keys. Remarkably, they managed to recover a 128-bit AES key from a distance of one meter using signals in the 2.4 GHz Bluetooth frequency range. Although the process took several days, the implications for security, particularly in industrial or automotive applications, are serious.
The nRF52832 chip is widely used across various sectors, making this vulnerability concerning. If attackers can exploit this flaw, they could potentially access sensitive data or control systems remotely. The researchers also noted that this type of attack could extend to other BLE chips, indicating a broader risk. The findings highlight a pressing need for enhanced security measures in BLE technology to safeguard against such remote attacks.
For those interested in the technical details, the full research paper is available online, providing in-depth analysis and methodologies used in the attack. The potential for similar vulnerabilities in other Bluetooth chips suggests that the issue may not be limited to just one model or manufacturer.
Questions about this article
No questions yet.