CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

WhisperPair Vulnerability in Google's Fast Pair Protocol

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A critical flaw (CVE-2025-36911, WhisperPair) in Google's Fast Pair protocol allows attackers to hijack Bluetooth audio devices, track users, and eavesdrop on conversations. The vulnerability affects hundreds of millions of devices from multiple manufacturers, regardless of the user's smartphone operating system. The flaw stems from improper implementation of the Fast Pair protocol in audio accessories, enabling unauthorized pairing and control. Attackers can exploit this using any Bluetooth-capable device within 14 meters. Google awarded a $15,000 bounty and worked with manufacturers to release patches, but updates may not be available for all devices.

Timeline

  1. 15.01.2026 18:13 1 articles · 3h ago

    WhisperPair Vulnerability in Google's Fast Pair Protocol Disclosed

    Security researchers discovered a critical flaw (CVE-2025-36911, WhisperPair) in Google's Fast Pair protocol that allows attackers to hijack Bluetooth audio devices, track users, and eavesdrop on conversations. The vulnerability affects hundreds of millions of devices from multiple manufacturers. Google awarded a $15,000 bounty and worked with manufacturers to release patches during a 150-day disclosure window. However, updates may not be available for all devices.

    Show sources

Information Snippets