this post was submitted on 08 Mar 2025
952 points (93.6% liked)

Technology

64938 readers
4144 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Source Link Privacy.Privacy test result

https://themarkup.org/blacklight?url=https%3A%2F%2Fwww.tarlogic.com%2Fnews%2Fbackdoor-esp32-chip-infect-ot-devices%2F&device=mobile&location=us-ca&force=false

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

Update: The ESP32 "backdoor" that wasn't.

you are viewing a single comment's thread
view the rest of the comments
[–] RmDebArc_5@sh.itjust.works 43 points 1 day ago (4 children)

I’d like to know if this is just a firmware update or unfixable, but sadly this seems just an ad rather than news

[–] ChaoticNeutralCzech@feddit.org 2 points 20 hours ago

There is nothing to "fix". Undocumented instructions have just been found in the silicon but they are not executable unless the ESP32's firmware their owner flashed to give it a purpose uses them. No pre-2025 firmware that we know of uses these instructions, and they might turn out to be buggy so compilers might not adopt them. If they turn out OK, the documentation of the instruction set will need an update, and compilers will be able to take advantage of the new instructions.

[–] badlotus@discuss.online 28 points 1 day ago* (last edited 1 day ago) (3 children)

Here’s an article with a bit more detail… but I’m still unclear whether these backdoor commands are hardware circuits or firmware logic.

Bleeping Computer: Undocumented "backdoor" found in Bluetooth chip used by a billion devices

[–] neuracnu@lemmy.blahaj.zone 5 points 1 day ago

Solid article. I imagine the folks at the cyberwire podcast will be doing more digging over the weekend for a solid summary come Monday.

[–] Crafter72@lemmy.dbzer0.com 1 points 1 day ago

Thanks for the link, this article is more clear compared to the posted above.

I'm more interested to the scope of the exploit whether it could touch the flash of the controller or not as you can also do OTA update through the BLE component.

[–] Ebby@lemmy.ssba.com 11 points 1 day ago

Even if it were fixable, it would be up to manufacturers to push updates. I doubt any really care enough.

[–] Treczoks@lemmy.world 6 points 1 day ago

It is not easy to determine how fixable this is. IIRC, the ESP32 has the wireless stack hidden from user space, and I am not sure if it is a blob included during link time, or if it is stored in a ROM of the chip. I do have the chips and the development enviroment in my studio, but (luckily) I decided to use a different chip for my project.

But I know there is a load of systems using either the ESP32 as their main processor, or as an auxiliary processor to add WiFi or BT capabilities, so this really is a big oh shit moment.