Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Home/CyberSecurity News/WhisperPair Attack Hijacks Laptops & Earbuds Allows Hijacking
CyberSecurity News

WhisperPair Attack Hijacks Laptops & Earbuds Allows Hijacking

A critical vulnerability in Google’s Fast Pair protocol allows attackers to hijack Bluetooth audio accessories and track users without their knowledge or consent. Security researchers from KU Leuven...

Emy Elsamnoudy
Emy Elsamnoudy
January 20, 2026 2 Min Read
0 0

A critical vulnerability in Google’s Fast Pair protocol allows attackers to hijack Bluetooth audio accessories and track users without their knowledge or consent.

Security researchers from KU Leuven have uncovered a vulnerability, tracked as CVE-2025-36911 and dubbed WhisperPair, that affects hundreds of millions of wireless earbuds, headphones, and speakers from major manufacturers.

Including Sony, Anker, Google, Jabra, JBL, Logitech, Marshall, Nothing, OnePlus, Soundcore, and Xiaomi.

Google classified the issue as critical and awarded the researchers the maximum possible bounty of $15,000.​ The flaw stems from the improper implementation of the Fast Pair protocol.

Critical Flaw in Fast Pair Implementation

According to the Fast Pair specification, Bluetooth accessories should ignore pairing requests when not in pairing mode.

However, many flagship devices fail to enforce this critical security check, allowing unauthorized devices to initiate the pairing process without user interaction.​

Attackers can exploit WhisperPair using any standard Bluetooth-capable device such as a laptop, smartphone, or Raspberry Pi.

Attacker's dashboard with location from the Find Hub network (source : whisperpair )
Attacker’s dashboard with location from the Find Hub network (source: whisperpair )

The attack succeeds within a median of 10 seconds at ranges up to 14 meters without requiring physical access to the vulnerable device.

Once paired, attackers gain complete control over the audio accessory, enabling them to play audio at high volumes or record conversations through the built-in microphone.​

Additionally, if an accessory has never been paired with an Android device, attackers can add it to their own Google account and track the victim’s location using Google’s Find Hub network.

The tracking notification that appears shows the victim’s own device, which may lead users to dismiss the warning as a system bug, allowing prolonged surveillance.​

Unwanted tracking notification showing the victim's own device (source : whisperpair )
Unwanted tracking notification showing the victim’s own device (source: whisperpair )

Cross-Platform Vulnerability

The vulnerability affects users across all platforms because the flaw exists in the accessories themselves, not in smartphones.

iPhone users with vulnerable Bluetooth devices face the same risks as Android users. Since Fast Pair functionality cannot be disabled on accessories, even users outside the Android ecosystem remain vulnerable.​

The WhisperPair researchers reported their findings to Google in August 2025, agreeing to a 150-day disclosure window for manufacturers to release security patches.

The only effective mitigation is installing firmware updates from device manufacturers.

While many manufacturers have released patches, software updates may not yet be available for all vulnerable devices.

Users should consult their accessory’s manual for firmware update instructions and verify patch availability directly with manufacturers.​

The WhisperPair vulnerability represents a systemic failure, as vulnerable devices passed both manufacturer quality assurance and Google’s certification process before reaching the market at scale.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Google Ads Used to Weaponize PDF Editor with Tampered

Next Post

SolyxImmortal Python Malware Steals Sensitive Data via

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us