Mobile Threat Catalogue



Threat Category: Network Threats: Bluetooth


Threat Description: BluePrinting occurs when adversaries remotely fingerprint Bluetooth-enabled devices to gather information to potentially exploit at a later point in time.

Threat Origin

Blueprinting 1

Exploit Examples

Not Applicable

CVE Examples

Not Applicable

Possible Countermeasures

Mobile Device User

To reduce the opportunity for this attack, disable Bluetooth when that feature is not in use

Operate Bluetooth on mobile devices in limited discoverable mode only as long as necessary to achieve desired pairing. See Specification of the Bluetooth System ver. 1.0B 2


  1. C. Mulliner and M. Herfurt, “Blueprinting”, 2013; [accessed 8/24/2016] 

  2. Specification of the Bluetooth System version 1.0 B, Bluetooth Special Interest Group, 1999; [accessed 8/24/2016]