This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

CC2651R3: Detailed recommendations on InjectaBLE vulnerability required

Part Number: CC2651R3
Other Parts Discussed in Thread: SYSCONFIG

Tool/software:

I have questions regarding

the InjectaBLE vulnerabilty as stated here: https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/injectable/

and the recommendation from TI: (src:https://www.ti.com/seclit/ca/swra716/swra716.pdf)

(if link does not work it is the swra716.pdf from you with the titel: PSIRT Notification  InjectaBLE: Injecting Malicious Traffic Into Established Bluetooth® Low Energy Connections

  1. Use encryption in any profile required under specification.
  2. For any vendor-specific profile implementation with custom attributes, require encryption by default for both read and write operations on its characteristics.
  3. Give preference to use LE Secure Connections pairing using authentication and require 128-bit encryption keys, if possible.

1): What exactly does that mean for the standard services we are offering on BLE: Generic Access, Generic Attribute and Device information?

Do we need to set the 'requires encryption'? What about those we do not even have access to?

2) How to deal with OAD - since not beeing a BLE standard - and our own services is clear

3) what has to be set in the sysconfig or otherwise to make hat happen?