CVE-2022-0916 An issue was discovered in Logitech Options OAuth 2.0 state parameter not properly validated.
To protect against these attacks, applications should always check the state parameter received from the server. In addition, applications should only permit authorized state change requests and should invalidate the state parameter for any unauthorised request. These best practices will significantly reduce the risk of CSRF attacks.
It was discovered that the BLE scanning process in the BLE adapter was vulnerable to a race condition. An attacker could potentially create a Denial of Service condition.
To protect against this, applications should always check for open scan nodes before accepting new scan requests. If a new scan request is found, it should be rejected immediately.
BLE (Bluetooth Low Energy) Vulnerability
BLE is a wireless technology that employs short-range radio signals to allow data transmission at speeds of up to 30 feet. It’s commonly used in low power, battery-powered devices like smart phones and heart rate monitors. Recently, it was discovered that the BLE scanning process in the BLE adapter was vulnerable to a race condition. An attacker could potentially create a Denial of Service condition.
To protect against this, applications should always check for open scan nodes before accepting new scan requests. If a new scan request is found, it should be rejected immediately.
CSRF Protection
: 3 Tips
CSRF Protection is a term used to refer to the process of mitigating Cross Site Request Forgeries Attacks. There are some easy practices that can reduce your risk of being attacked by these types of attacks.
1) Validate all state changes from the server
2) Only allow authorized state change requests
3) Invalidate state parameters for any unauthorised request
These steps will significantly reduce the risk of CSRF attacks on your application.
BLE HID Device Identifier (HID) CSRF Tokens
The BLE HID device identifier (HID) is an identifier that specifies a particular Bluetooth device. It is generally used to identify Bluetooth devices and track the devices’ movements, but it can also be used to carry out the confirmation of a specific operation. The HID CSRF token is a flag that indicates whether or not a CSRF attack should be executed. When this flag is set, no CSRF attack should be executed. In general, attackers cannot easily manipulate this token; however, when in invalid state or in invalid order, any attacker can modify its value and execute a CSRF attack without being blocked by the server.
To protect against this, applications should always check for (1) HID open scan nodes before accepting new scan requests and (2) if they receive a request with a valid HID CSRF token and an invalid state parameter, reject it immediately.
Bluetooth Low Energy scanning weakness
A Bluetooth Low Energy scanning weakness was discovered in the BLE adapter. The scanning process is vulnerable to a race condition that could result in a Denial of Service condition.
To protect against this, applications should always check for open scan nodes before accepting new scan requests. If a new scan request is found, it should be rejected immediately.
Timeline
Published on: 05/03/2022 14:15:00 UTC
Last modified on: 05/10/2022 23:59:00 UTC