Clickjacking is possible on the Nearby Devices Dashboard. Using this, (among other things) an attacker could create a malicious webpage which can trick a victim into deleting his/her own device.

POC Video: (00:15) (music)

Core Issue:

The Nearby Devices Dashboard page on actually embeds, which displays the Dashboard. This host behaves just like, but looks like an AppEngine App.

The host doesn’t have any framing protections.

When a victim uses the Nearby Devices Dashboard, she has to log in. When she logs in, since the whole Dashboard is in an iframe, the login cookies get set on

So, its possible to embed, and a victim will have valid cookies, so the embedded frame will be logged in.

Steps to reproduce:

  1. Create/log into a Google account
  2. Go to, log in, and create a GCP project when prompted
  3. Go to Add Device, and create a new device. (Choose Fast Pair -> Headphones for the least required fields & You must upload an 512x512 image)
  4. Convert the new device’s Model ID from hex to decimal (e.g. for the Pixel Buds: 0x92BBBD -> 9616317)
  5. Open the POC HTML file from below, and add the ID after the # sign in the URL (e.g. poc.html#9616317)
  6. When the POC loads, see that the device management page got embedded, and clicking the Click here for cat pics!! deletes the victim’s device

POC Code:

        <button id="button" style="pointer-events: none;z-index:1;left:460px;position:relative;top:-330px;background-color: greenyellow;"><b>Click here for<br/>cat pics!!</b></button>
        <iframe id="iframe" width=500px height=500px style="opacity: 0.1;"></iframe>
        document.getElementById("iframe").src = "" + window.location.hash.substring(1);

        window.addEventListener("blur", function(){
            var elem = document.createElement('iframe');
   = 'position:absolute;width:50%;height:50%;z-index:100';
            elem.src = ""

Real-world Attack:

Attacker wants to delete the second generation Pixel Buds device, to cause a DOS for users who want to pair with it.

  1. Attacker buys a Pixel Buds
  2. From the BLE advertisements, Attacker notes that the Pixel Buds has a Model ID of 0x92BBBD
  3. Attacker converts this ID to decimal 0x92BBBD -> 9616317
  4. Attacker sets up the POC, and sends the malicious link (poc.html#9616317) to a Google Engineer who is logged into the Nearby Devices Dashboard and has access to the Pixel Buds device
  5. If the Google Engineer clicks Click here for cat pics!!, the Pixel Buds device gets deleted, probably causing a DOS/other issues for users who want to pair with their Pixel Buds

[Disclosure Warning]:

This issue is subject to a 90 day disclosure deadline. On 2021-05-17 this issue will be publicly disclosed. If you would like to redact additional information or if for some reason the issue can’t be fixed until the deadline, let me know in a comment.

Thank you!