WhisperPair exposes Bluetooth earbuds and headphones to tracking and eavesdropping
WhisperPair is a set of attacks that lets an attacker hijack many popular Bluetooth audio accessories that use Google Fast Pair and, in some cases, even track their location via Googleβs Find Hub networkβall without requiring any user interaction.
Researchers at the Belgian University of Leuven revealed a collection of vulnerabilities they found in audio accessories that use Googleβs Fast Pair protocol. The affected accessories are sold by 10 different companies: Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech, and Google itself.
Google Fast Pair is a feature that makes pairing Bluetooth earbuds, headphones and similar accessories with Android devices quick and seamless, and syncs them across a userβs Google account.
The Google Fast Pair Service (GFPS) utilizes Bluetooth Low Energy (BLE) to discover nearby Bluetooth devices. Many big-name audio brands use Fast Pair in their flagship products, so the potential attack surface consists of hundreds of millions of devices.
The weakness lies in the fact that Fast Pair skips checking whether a device is in pairing mode. As a result, a device controlled by an attacker, such as a laptop, can trigger Fast Pair even when the earbuds are sitting in a userβs ear or pocket, then quickly complete a normal Bluetooth pairing and take full control.
What that control enables depends on the capabilities of the hijacked device. This can range from playing disturbing noises to recording audio via built-in microphones.
It gets worse if the attacker is the first to pair the accessory with an Android device. In that case, the attackerβs Owner Account Keyβdesignating their Google account as the legitimate ownerβsβto the accessory. If the Fast Pair accessory also supports Googleβs Find Hub network, which many people use to locate lost items, the attacker may then be able to track the accessoryβs location.
Google classified this vulnerability, tracked under CVEβ2025β36911, as critical. However, the only real fix is a firmware or software update from the accessory manufacturer, so users need to check with their specific brand and install accessory updates, as updating the phone alone does not fix the issue.
How to stay safe
To find out whether your device is vulnerable, the researchers published a list and recommend keeping all accessories updated. The research team tested 25 commercial devices from 16 manufacturers using 17 different Bluetooth chipsets. They were able to take over the connection and eavesdrop on the microphone on 68% of the tested devices.β
These are the devices the researchers found to be vulnerable, but itβs possible that others are affected as well:
- Anker soundcore Liberty 4 NC
- Google Pixel Buds Pro 2β
- JBL TUNE BEAMβ
- Jabra Elite 8 Activeβ
- Marshall MOTIF II A.N.C.β
- Nothing Ear (a)β
- OnePlus Nord Buds 3 Proβ
- Sony WF-1000XM5β
- Sony WH-1000XM4β
- Sony WH-1000XM5β
- Sony WH-1000XM6β
- Sony WH-CH720Nβ
- Xiaomi Redmi Buds 5 Proβ
We donβt just report on phone securityβwe provide it
Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices byΒ downloading Malwarebytes for iOS, and Malwarebytes for Android today.