On Fitbit activity-tracker devices, certain addresses never change. According to the popets-2019-0036.pdf document, this leads to "permanent trackability" and "considerable privacy concerns" without a user-accessible anonymization feature. The devices, such as Charge 2, transmit Bluetooth Low Energy (BLE) advertising packets with a TxAdd flag indicating random addresses, but the addresses remain constant. If devices come within BLE range at one or more locations where an adversary has set up passive sniffing, the adversary can determine whether the same device has entered one of these locations.
References
Link | Resource |
---|---|
https://petsymposium.org/2019/files/papers/issue3/popets-2019-0036.pdf | Third Party Advisory |
https://twitter.com/TedOnPrivacy/status/1151390589990187008 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-07-15 13:15
Updated : 2024-02-04 20:20
NVD link : CVE-2014-10374
Mitre link : CVE-2014-10374
CVE.ORG link : CVE-2014-10374
JSON object : View
Products Affected
fitbit
- charge_2
- charge_2_firmware
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor