提出 #766457: Mendi Innovation AB Mendi V4 Cleartext Transmission of Sensitive Information情報

タイトルMendi Innovation AB Mendi V4 Cleartext Transmission of Sensitive Information
説明RESERVED IDENTIFIER: CVE-2026-2671 This vulnerability in the Mendi neurofeedback headset allows an attacker to perform unauthorized interception of functional near-infrared spectroscopy (fNIRS) sensor data by exploiting the failure to enforce secure BLE pairing mechanisms or implement application-layer encryption during data transmission. The issue stems from the device's neural activity data being sent over the air in cleartext, with no encryption applied at any layer of the communication stack. Because no pairing, authentication, or active probing is necessary, an attacker positioned within Bluetooth Low Energy (BLE) radio reception range can passively sniff the device's data streams using widely available wireless analysis hardware, such as the Nordic nRF Sniffer application or a modified smartphone. Subsequently, the captured data streams can be decoded to reconstruct the user's hemodynamic response signals. This allows for an observer to visualize prefrontal cortex activity in real time without the user's consent or knowledge, leaving no forensic artifacts or evidence of data exfiltration on the device or its associated software.
ソース⚠️ https://ab3j.radio/mendi.pdf
ユーザー
 drewbug (UID 92544)
送信2026年02月24日 14:36 (1 月 ago)
モデレーション2026年03月07日 18:39 (11 days later)
ステータス承諾済み
VulDBエントリ349702 [Mendi Neurofeedback Headset V4 Bluetooth Low Energy 弱い暗号化]
ポイント17

Interested in the pricing of exploits?

See the underground prices here!