Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol

Scanner Tool to Detect WhisperPair Flaw in Google's Fast Pair Protocol

WPair is an Android application designed to identify and demonstrate the CVE-2025-36911 vulnerability affecting millions of Bluetooth audio devices worldwide.

The tool addresses a critical authentication bypass flaw discovered by KU Leuven researchers in Google’s Fast Pair protocol, commonly referred to as WhisperPair.​

CVE-2025-36911 represents a systemic failure in Fast Pair implementations across multiple manufacturers and chipsets. The vulnerability stems from improper enforcement of pairing mode verification.

WPair Scanner for WhisperPair Flaw (source : GitHub )
WPair Scanner for WhisperPair Flaw (source: zalexdev GitHub)

According to the WhisperPair research, many devices fail to disregard pairing requests from unauthorized sources when not explicitly in pairing mode.

Allowing attackers to forcibly establish connections within seconds at ranges up to 14 meters. The attack requires no user interaction or physical device access, making it particularly dangerous for consumer audio equipment.​

WPair Functionality

The application provides three core scanning and testing modes. The BLE Scanner discovers nearby Fast Pair devices by identifying devices that broadcast the 0xFE2C service UUID.

google

The Vulnerability Tester performs non-invasive checks to determine patch status without establishing connections.

For authorized security research, the Exploit feature demonstrates the complete attack chain, including key-based pairing bypass, BR/EDR address extraction, and Bluetooth Classic bonding.​

Feature Description
BLE Scanner Detects Fast Pair devices in real time
Vulnerability Tester Checks CVE-2025-36911 patch status safely
Exploit Demo Proof-of-concept for authorized testing
HFP Audio Access Shows microphone access after exploit
Live Listening Streams audio to phone instantly
Audio Recording Saves captured audio for analysis
Device Status Detection Flags devices in pairing mode
Key-Based Bypass Demonstrates Fast Pair auth bypass
BR/EDR Extraction Retrieves Bluetooth Classic addresses
Classic Bonding Creates persistent audio connections
Account Key Persistence Demonstrates long-term device tracking

Post-exploitation capabilities include accessing the Hands-Free Profile for microphone functionality.

Users can enable live audio streaming directly to their phone speaker or save captured audio as M4A files for forensic analysis.​

The vulnerability allows attackers to hijack devices without authorization, enabling them to control audio playback, record conversations, and potentially establish persistent tracking through Google’s Find Hub Network.

If a device has never connected to an Android device, attackers can add it to their own account for location tracking, exploiting the mechanism that designates the first Account Key writer as the device owner.​

WPair Work flow (source: GitHub)
WPair Work flow (source: zalexdev GitHub)

Affected manufacturers include JBL, Harman Kardon, Sony, Marshall, and numerous others, impacting an estimated hundreds of millions of users globally.

Technical Requirements and Installation Options

Category Details
Minimum Android Version Android 8.0 (API 26) or higher
Bluetooth Support Bluetooth Low Energy (BLE) required
Permissions Location permissions (or Nearby Devices on Android 13+)
Installation – APK Download pre-compiled APK from Releases
Installation – Source Build Build from source using Gradle

Google classified this issue as critical and awarded researchers the maximum $15,000 bounty. The 150-day disclosure window ended in January 2026, and manufacturers are now releasing patches.

WPair explicitly excludes Find Hub Network provisioning functionality to maintain ethical boundaries around stalkerware implementation.​

WPair requires Android 8.0 or higher with Bluetooth LE support and appropriate location permissions. The application is available both as a precompiled APK and as a compiled source via Gradle.

According to the advisory, security researchers should verify they possess explicit written authorization before testing devices they do not own.

The tool represents a significant advancement in vulnerability assessment for the IoT audio ecosystem, enabling manufacturers and security teams to identify affected devices requiring immediate firmware updates.

googlenews



Source link