CVE-2020-12856

9.8 CRITICAL

📋 TL;DR

This vulnerability in COVID-19 contact tracing apps allows attackers to conduct long-term re-identification of users via Bluetooth signals. The flaw enables tracking individuals over extended periods and potentially facilitates other Bluetooth-based attacks. Users of COVIDSafe (v1.0.17 and earlier), TraceTogether, ABTraceTogether, and similar contact tracing applications on iOS and Android are affected.

💻 Affected Systems

Products:
  • COVIDSafe
  • TraceTogether
  • ABTraceTogether
  • Other contact tracing apps using OpenTrace framework
Versions: COVIDSafe v1.0.17 and earlier, other apps using vulnerable OpenTrace implementations
Operating Systems: iOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations using the default Bluetooth-based contact tracing functionality. The vulnerability is in how Bluetooth identifiers are handled over time.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could persistently track individuals' movements and locations over weeks or months, potentially enabling stalking, surveillance, or correlation with other data sources to deanonymize users.

🟠

Likely Case

Privacy violation through long-term tracking of Bluetooth identifiers, allowing attackers to monitor when and where specific devices appear over time.

🟢

If Mitigated

Limited to short-term Bluetooth proximity detection as intended, without persistent tracking capabilities.

🌐 Internet-Facing: HIGH - Bluetooth signals are broadcast wirelessly and can be intercepted by nearby devices without network connectivity requirements.
🏢 Internal Only: LOW - The vulnerability requires physical proximity to affected devices via Bluetooth, not internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires Bluetooth scanning equipment and proximity to target devices. Public proof-of-concept demonstrates the tracking capability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: COVIDSafe v1.0.18+ and updates to other affected apps

Vendor Advisory: https://www.health.gov.au/resources/publications/covidsafe-app-update

Restart Required: Yes

Instructions:

1. Update affected contact tracing apps through official app stores. 2. For COVIDSafe, update to v1.0.18 or later. 3. Ensure automatic updates are enabled. 4. Restart the application after updating.

🔧 Temporary Workarounds

Disable Bluetooth when not needed

all

Turn off Bluetooth to prevent broadcasting vulnerable identifiers

Settings > Bluetooth > Toggle Off

Uninstall vulnerable apps

all

Remove affected contact tracing applications until patched

Long press app icon > Uninstall

🧯 If You Can't Patch

  • Disable Bluetooth completely when not in use
  • Use airplane mode in sensitive locations to disable all wireless communications

🔍 How to Verify

Check if Vulnerable:

Check app version in settings: COVIDSafe v1.0.17 or earlier is vulnerable. For other apps, check if using OpenTrace framework.

Check Version:

Open app > Settings > About or App Info > Version

Verify Fix Applied:

Confirm app version is updated to patched version (COVIDSafe v1.0.18+). Verify Bluetooth identifier rotation occurs as designed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth scanning patterns from unknown devices
  • Persistent Bluetooth connections to contact tracing apps

Network Indicators:

  • Bluetooth Low Energy (BLE) advertising packets with consistent identifiers over time
  • Multiple devices scanning for specific BLE services

SIEM Query:

Bluetooth scanning devices with MAC addresses correlating to contact tracing app identifiers over extended periods

🔗 References

📤 Share & Export