On Fitbit activity-tracker devices, certain addresses never change. According to the popets-2019-0036.pdf document, this leads to "permanent trackability" and "considerable privacy concerns" without a user-accessible anonymization feature. The devices, such as Charge 2, transmit Bluetooth Low Energy (BLE) advertising packets with a TxAdd flag indicating random addresses, but the addresses remain constant. If devices come within BLE range at one or more locations where an adversary has set up passive sniffing, the adversary can determine whether the same device has entered one of these locations.
                
            References
                    | Link | Resource | 
|---|---|
| https://petsymposium.org/2019/files/papers/issue3/popets-2019-0036.pdf | Third Party Advisory | 
| https://twitter.com/TedOnPrivacy/status/1151390589990187008 | Third Party Advisory | 
| https://petsymposium.org/2019/files/papers/issue3/popets-2019-0036.pdf | Third Party Advisory | 
| https://twitter.com/TedOnPrivacy/status/1151390589990187008 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    No history.
Information
                Published : 2019-07-15 13:15
Updated : 2024-11-21 02:03
NVD link : CVE-2014-10374
Mitre link : CVE-2014-10374
CVE.ORG link : CVE-2014-10374
JSON object : View
Products Affected
                fitbit
- charge_2
- charge_2_firmware
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
