Security researchers have uncovered a series of critical vulnerabilities in Bluetooth System-on-Chips (SoCs) manufactured by Airoha, a subsidiary of MediaTek and a key supplier for the consumer electronics market. The flaws affect a wide range of popular True Wireless Stereo (TWS) headphones and earbuds from brands like Sony, Bose, JBL, and Marshall. The most severe of these, CVE-2025-20702 (CVSS 9.6), allows an unauthenticated attacker within Bluetooth range to remotely execute code, potentially leading to device hijacking, eavesdropping via the microphone, and theft of cryptographic keys. The vulnerabilities stem from an insecure, undocumented custom protocol. While the flaws were responsibly disclosed, the broad and often opaque supply chain for these chips means many devices may remain vulnerable.
The vulnerabilities were discovered by researchers at ERNW and are collectively referred to as affecting the RACE (Remote Access Control Engine) protocol, a custom Airoha protocol used for diagnostics and firmware updates. The core issues are:
The vulnerabilities affect a wide range of Airoha chipsets used in countless consumer audio products. The specific series mentioned include:
These chips are found in products from major brands such as Sony, Bose, JBL, Marshall, and Jabra.
There is no evidence of these vulnerabilities being exploited in the wild. They were discovered by security researchers and responsibly disclosed to Airoha and affected vendors in June 2025.
The ability to achieve remote code execution on a headset has severe implications:
Applying firmware updates from headphone manufacturers is the primary way for end-users to remediate this vulnerability.
Mapped D3FEND Techniques:
Airoha and device manufacturers must follow secure coding practices, including implementing authentication on all diagnostic and update protocols.
Insecure features like the RACE protocol should be disabled in production firmware builds.
Mapped D3FEND Techniques:
For end-users of affected headphones from Sony, Bose, JBL, and others, the only effective defense is to perform a software (firmware) update. Users must open the companion app for their specific headphone model on their smartphone and check for any available updates. The manufacturers are responsible for pushing out patched firmware that disables or secures the vulnerable RACE protocol. Given the opaque nature of consumer electronics supply chains, users may not know if their device contains an Airoha chip. Therefore, the best practice is to regularly check for and apply all firmware updates for all connected devices. This action directly fixes the root cause on the device itself.
This incident is a clear failure of secure development practices by the chip manufacturer, Airoha. To prevent such flaws, SoC vendors must practice rigorous Application Hardening. Specifically, any diagnostic or administrative interface like RACE must never be exposed in production firmware without mandatory, strong authentication. Such interfaces should be disabled by default and only enabled via a secure, authenticated mechanism. The fact that an unauthenticated protocol allowing arbitrary memory writes was present on consumer devices is a critical design flaw. Secure coding standards, threat modeling, and penetration testing must be part of the SoC development lifecycle to ensure such powerful and dangerous features are not accessible to attackers.
For security researchers and advanced users, Bluetooth Connection Analysis can be used to identify vulnerable devices. Using tools like Wireshark with a Bluetooth adapter or specialized radio analysis hardware, one can monitor the local environment for Bluetooth advertisements. The vulnerable Airoha devices will likely advertise a specific service UUID corresponding to the RACE protocol. By identifying devices that expose this service, one could build a list of potentially vulnerable assets in an environment. While not a mitigation, this detection technique allows for targeted assessment and can help organizations identify and prioritize the replacement or updating of vulnerable personal electronics used by employees.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats