eugenechystiakov/Unsplash

Security researchers have uncovered a critical flaw in Google Fast Pair that lets attackers silently seize control of nearby headphones in a matter of seconds. The same technology that makes it effortless to connect wireless earbuds, speakers, and car stereos now doubles as a shortcut for hijacking audio, tracking users, and in some cases activating microphones without consent. The scale is staggering, with hundreds of millions of Bluetooth accessories exposed and many still waiting on patches.

At its core, the issue is not exotic: Fast Pair was designed to trade a bit of complexity for convenience, and attackers have found a way to turn that shortcut against users. The result is a new class of attacks, collectively dubbed WhisperPair, that can let someone within Bluetooth range quietly pair to your gear, blast unwanted audio, or listen in on conversations while you assume your headphones are safely connected to your own phone.

How Fast Pair became a fast lane for attackers

Google Fast Pair was built to remove friction from connecting Bluetooth accessories, using a shared protocol so that earbuds and headphones pop up instantly on Android phones and other devices. Instead of forcing people through clunky pairing menus, Fast Pair relies on background exchanges that were meant to be invisible to the user, which is exactly what makes the current flaw so dangerous. Researchers have shown that the same invisible process can be abused so an attacker, not the owner, becomes the first device to claim a nearby accessory that is in pairing mode, turning a convenience feature into a stealthy takeover path for Google Fast Pair devices.

Within Bluetooth range, which typically extends to about 10 meters in open space, the hijack can happen quickly enough that a victim might never suspect foul play. One report notes that an attacker can silently pair with a vulnerable accessory in roughly 10 to 15 seconds, then start interrupting music, injecting audio, or forcing the device to disconnect from its rightful owner. Because Fast Pair is designed to feel automatic, a user who sees a brief connection glitch or an odd pairing prompt may dismiss it as a random error rather than a sign that someone nearby has just taken control of their Bluetooth headphones.

Inside WhisperPair: what researchers actually found

The newly disclosed WhisperPair attacks target the shared protocol that underpins Fast Pair across a wide range of brands and models. Security specialists at Belgium’s KU Leuven University Computer Security and Industrial Cryptography group have demonstrated that the pairing data used by accessories can be predicted or derived, which lets an attacker impersonate a legitimate phone and claim the device. Their WhisperPair technique shows that once someone has worked out the relevant identifiers for one product line, they can often determine them for all devices that implement the same Fast Pair profile, turning a single weakness into a systemic issue for hundreds of models.

WhisperPair is not just about stealing a connection, it is about what happens after the attacker is in. Once paired, the hostile device can change volume, skip tracks, or route calls, but researchers warn that the more serious risk is covert listening and tracking. One analysis explains that the flaw, tracked as CVE-2025-36911, lets an attacker follow a user’s movements and in some cases access audio streams or messages, which is why the vulnerability has been rated critical and assigned a dedicated CVE entry.

Who is at risk: from Sony to “hundreds of millions” of earbuds

The impact is not limited to a niche set of gadgets. Researchers say that hundreds of millions of wireless earbuds, headphones, and speakers are vulnerable, because they all rely on the same Fast Pair protocol that WhisperPair targets. A widely shared technical summary notes that “Hundreds of millions of wireless earbuds, headphones, and speakers are vulnerable to silent hijacking due to a flaw in Google’s Fast Pair implementation,” and warns that attackers can not only take over playback but in some cases activate the microphone, turning everyday accessories into opportunistic listening devices.

Major consumer brands are caught up in the fallout. One detailed breakdown describes a major security flaw affecting Sony, Google, and other popular headphones that ship with Fast Pair enabled by default, meaning users may never have changed any settings before becoming exposed. The same report emphasizes that Researchers have confirmed the issue across multiple product lines, not just a single flagship model, which is why the recommendation is to update firmware on any Fast Pair compatible accessory from Sony and Google as soon as patches appear.

From hijacking to eavesdropping: what an attacker can actually do

Once an attacker has silently paired with a vulnerable accessory, the range of abuse is broader than a simple prank. Researchers explain that this level of access “gives an attacker complete control over the accessory,” allowing them to play audio at high volumes, change tracks, or disconnect the legitimate owner whenever they are within range. A second documented weakness lets the attacker keep listening in even after the victim thinks they have regained control, because the malicious device can remain paired in the background and continue to receive audio from the vulnerable device.

Other analyses go further, warning that hijacked earbuds can be used for tracking and eavesdropping in more subtle ways. One security bulletin notes that the flaw lets attackers monitor a user’s location by following the Bluetooth identifiers of their accessories, while another warns that calls and voice messages made using built in microphones could be exposed if the attacker maintains a covert connection. Combined with the fact that the vulnerability research was reported to Google privately in August 2025 and only later disclosed publicly, the result is a long window in which unpatched devices may have been quietly at risk of being hijacked.

What Google and researchers say you should do now

Google says it has addressed key security vulnerabilities that could affect Bluetooth products, but independent researchers contend that issues persist for many users who have not yet installed firmware updates. One report notes that attacks can work from as far as about 46 feet away, which means someone in the same café, airport lounge, or subway car could potentially target your headphones without ever touching your phone. The most immediate advice is to check for updates on every Fast Pair compatible accessory you own and to apply any patches that mention security fixes for Bluetooth vulnerabilities.

Security briefings are blunt that software updates are the only reliable mitigation for WhisperPair, because the flaw is baked into the protocol rather than a simple configuration mistake. One overview that cites ZDNET’s technical analysis stresses that protocol level changes and firmware updates are the sole mitigation, and that users should treat any unpatched Fast Pair accessory as potentially exposed whenever it is in pairing mode. Until those updates are installed, experts recommend disabling automatic pairing where possible, avoiding pairing in crowded public spaces, and being skeptical of unexpected prompts to connect to nearby devices.

More from Morning Overview