Workflow
Device Vulnerability
icon
Search documents
Android And iPhone Users Warned To Update Now Over Critical Google Flaw
Forbes· 2026-01-19 17:00
Core Insights - A new academic study has identified vulnerabilities in Google's Fast Pair system that can be exploited by certain audio devices, allowing unauthorized access to users' headphones and speakers [4][5][6] - Currently, there is no evidence that these vulnerabilities have been exploited in real-world scenarios, and many affected audio devices have received software updates to address the issues [3][5] Group 1: Vulnerabilities in Google Fast Pair - Google Fast Pair allows seamless Bluetooth pairing of gadgets with Android and ChromeOS devices, but researchers found vulnerabilities in audio products from multiple brands [4][5] - The vulnerabilities enable unauthorized users within Bluetooth range to connect to audio peripherals, potentially hijacking them to play audio or control built-in microphones [6] Group 2: Affected Brands and Devices - The study tested audio accessories from ten brands, including Sony, JBL, Marshall, Nothing, OnePlus, Xiaomi, Jabra, Soundcore, Logitech, and Google, highlighting the need for users to regularly check for software updates [5][8] - Specific vulnerabilities were identified in five models of Sony earbuds and headphones, as well as Google's Pixel Buds Pro 2, which could allow tracking of users' movements even if the devices were only paired with an iPhone [8][7]