this post was submitted on 08 Mar 2025
891 points (93.8% liked)

Technology

64938 readers
4649 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Source Link Privacy.Privacy test result

https://themarkup.org/blacklight?url=https%3A%2F%2Fwww.tarlogic.com%2Fnews%2Fbackdoor-esp32-chip-infect-ot-devices%2F&device=mobile&location=us-ca&force=false

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

Update: The ESP32 "backdoor" that wasn't.

you are viewing a single comment's thread
view the rest of the comments
[–] Ebby@lemmy.ssba.com 192 points 23 hours ago (1 children)

Well... Shit.

There are so, so, so, many ESP32's in not just my house, but practically everyone I know.

There outta be fines for this BS.

[–] cogman@lemmy.world 152 points 23 hours ago (4 children)

You're fine. This isn't something that can be exploited over wifi. You literally need physical access to the device to exploit it as it's commands over USB that allow flashing the chip.

This is a security firm making everything sound scary because they want you to buy their testing device.

[–] Blue_Morpho@lemmy.world 67 points 22 hours ago (3 children)

You literally need physical access to the device to exploit it

You don't need physical access. Read the article. The researcher used physical USB to discover that the Bluetooth firmware has backdoors. It doesn't require physical access to exploit.

It's Bluetooth that's vulnerable.

https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/

[–] ChaoticNeutralCzech@feddit.org 2 points 8 hours ago

This is about silicon. Undocumented instructions have just been found in it but they are not executable unless the ESP32's firmware uses them. Firmware cannot be edited to use them unless you have an existing vulnerability such as physical access or insecure OTA in existing firmware (as far as researchers know).

[–] cogman@lemmy.world 68 points 21 hours ago (1 children)

I just re-read the article and yes, you still need physical access.

The exploit is one that bypasses OS protections to writing to the firmware. In otherwords, you need to get the device to run a malicious piece of code or exploit a vulnerability in already running code that also interacts with the bluetooth stack.

The exploit, explicitly, is not one that can be carried out with a drive-by Bluetooth connection. You also need faulty software running on the device.

[–] Blue_Morpho@lemmy.world 18 points 20 hours ago (1 children)

"Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections."

I of course don't know details but I'm basing my post on that sentence. "Backdoor may be possible via ... rogue Bluetooth connections."

[–] haleywm@startrek.website 71 points 20 hours ago (2 children)

Looking at the article, the exploit requires you to be able to send arbitrary data to the Bluetooth device over a physical connection. This means that a properly secure application will be protected from drive by connections, but if the application has an exploit that either lets an attacker write arbitrary values to the Bluetooth controller, or more likely contains a general arbitrary code execution exploit, then you could use this to rewrite values to the chip that would let you "persist" certain changes to the Bluetooth chip that would be difficult to notice.

I would consider this a moderate concern, as this will definitely increase your options if you're looking to be able to make an attack that targets a specific device and this gives you a few additional persistence options, but any attack would have to be designed for a particular program running connected to a Bluetooth chip.

A more likely concern in my opinion would be the possibility of a supply chain attack, where someone compromises a Bluetooth chip that they know will be used to construct a particular part.

I don't think that it's super likely that either of these will affect the average person, only corporations and governments where espionage is an actual threat, as if you can find a Bluetooth IOT device that you want to mess with, like a Bluetooth enabled door lock, then you're more likely to be able to find an arbitrary code execution attack which causes it to unlock immediately. Being able to spoof a different Bluetooth device isn't likely to give you that big of an advantage when you're working with a device that was already vulnerable for a different reason.

[–] ByteJunk@lemmy.world 2 points 12 hours ago (1 children)

Thank you for the analysis, very insightful!

Do you reckon this is more of an oversight or bug in the BT stack, or a deliberately places backdoor as the title seems to suggest?

[–] haleywm@startrek.website 6 points 10 hours ago

From what I can tell from looking at it, this seems like something deliberately left in, but not for malicious reasons. The op codes referenced simply give access to lower level parts of the boards programming. ESP32's are already a user programmable board, a valid use case is to run your entire application on one if the code being run is lightweight enough to not interfere with the Bluetooth code. Either during development, or during runtime, these undocumented codes are likely used to run specific commands on the board.

The actual issue as far as I can tell, since normally it's valid usage to rewrite the board over USB, is that ESP32 boards also offer ways to encrypt device code, and require it to be signed, and you are presumably able to mess with this in order to dump code that was expected to be securely encrypted, and overwrite code on devices that was intended to require signing. (https://docs.espressif.com/projects/esp-idf/en/latest/esp32s3/security/secure-boot-v2.html#background)

Proving what someone was thinking when they programmed something is extremely difficult unless you can find written evidence of someone specifically saying if they did something or not, but this all seems like a legitimate minor exploit in a device that wasn't built by, or intended for, people who are working against highly resourced attackers. This is still not a concern for normal people who aren't concerned about being attacked by spies, and if a nation state wanted to hide a vulnerability in something then there are far easier paths to take than one that only works if you can steal a microcontroller so you can connect to it over USB.

[–] Dimmer@leminal.space 7 points 19 hours ago

thank you for the nice analysis. this should really be voted highest.

[–] IllNess@infosec.pub 30 points 22 hours ago

Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections.

I really wish these articles just tell us what these scenarios are. I understand companies need publicity or need to sell software but if it isn't replicatable and the article says "might be possible" it kind of sounds like a secuity sales pitch.

This is especially the case if an attacker already has root access, planted malware, or pushed a malicious update on the device that opens up low-level access.

This part basically sounds more like a software issue where the attacker has a way in already. The system is already vulernable at this point before using the exploit found.

I don't think there's enough information out yet.

It is very interesting though.

[–] Ebby@lemmy.ssba.com 14 points 23 hours ago (1 children)

I do have a few outside. Probably not the best security-wise. Haha. Those are the first to get patched when one comes out.

[–] cogman@lemmy.world 33 points 23 hours ago (1 children)

Security wise, unless you are being specifically targeted by someone, you are almost certainly fine. And if you are being specifically targeted, I think someone hacking your ESPs is the least of your worries. A malicious attacker that knows your physical location can do a lot more scary things than just spying through ESPs.

[–] Treczoks@lemmy.world 4 points 22 hours ago (2 children)

Just wait until a jester creates a software that sends an erase flash backdoor command to any BT device it sees.

One of my friends is a type I diabetic. He had some sort of smart thingamajig in his teenage years for measuring blood sugar, so you could monitor it over time or warn your family if you're in some critical situation.

The jester may mean simply to prank, but they may well have blood on their hands if they fuck up medical devices such as that one.

[–] oldfart@lemm.ee 2 points 11 hours ago* (last edited 11 hours ago)

And runs with an USB cable flashing other peoples ESPs to ruin everyone's day

[–] tehmics@lemmy.world 6 points 23 hours ago (2 children)

In that case, how long til some open source project uses it to make a custom firmware to bypass the manufacturer bs and integrate my cheap IoTs seamlessly into Home assistant?

[–] Oisteink@feddit.nl 9 points 23 hours ago (1 children)

You can already reflash a lot of devices for this purpose. And you could use esp-home to customise once reflashed

[–] tehmics@lemmy.world 3 points 23 hours ago (3 children)

Really? Where can I find this

[–] Oisteink@feddit.nl 3 points 23 hours ago* (last edited 22 hours ago) (2 children)
[–] tehmics@lemmy.world 2 points 22 hours ago
[–] Oisteink@feddit.nl 1 points 22 hours ago* (last edited 22 hours ago)

Esp-home also works with the older esp-01 - it was released as a wifi module so there are only two gpio’s, but thats enough for a lot of home automation stuff.

Here’s one i have connected to HA, where HA uses rest-api to capture some data from a game called tacticus, and it shows my available tokens for guild raid and arena

[–] earphone843@sh.itjust.works 2 points 21 hours ago

Tasmota is another option if they have your specific device in their list. Otherwise you have to do some debugging to figure out what gpio or i2c address to use.

[–] cogman@lemmy.world 3 points 23 hours ago

I think we are basically already there with ESPs :D.