ESP32 microchip Undocumented commands found in Bluetooth chip used by a billion devic
by lulagain - Monday March 10, 2025 at 11:37 PM
#1
[Image: esp32.jpg]
Update 3/9/25: After receiving concerns about the use of the term 'backdoor' to refer to these undocumented commands, we have updated our title and story. Our original story can be found here.
The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains undocumented commands that could be leveraged for attacks.
The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence.
This was discovered by Spanish researchers Miguel Tarascó Acuña and Antonio Vázquez Blanco of Tarlogic Security, who presented their findings yesterday at RootedCON in Madrid.
"Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices," reads a Tarlogic announcement shared with BleepingComputer.
"Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls."
The researchers warned that ESP32 is one of the world's most widely used chips for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk is significant.
[Image: presentation.jpeg]
Discovering undocumented commands in ESP32
[Image: diagram.jpg]
In their RootedCON presentation, the Tarlogic researchers explained that interest in Bluetooth security research has waned but not because the protocol or its implementation has become more secure.
Instead, most attacks presented last year didn't have working tools, didn't work with generic hardware, and used outdated/unmaintained tools largely incompatible with modern systems.
Tarlogic developed a new C-based USB Bluetooth driver that is hardware-independent and cross-platform, allowing direct access to the hardware without relying on OS-specific APIs.
Armed with this new tool, which enables raw access to Bluetooth traffic, Tarlogic discovered hidden vendor-specific commands (Opcode 0x3F) in the ESP32 Bluetooth firmware that allow low-level control over Bluetooth functions.
Read full 
here :-https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/
[Image: 128.gif]
@Ater  @antisocial My Nigga's
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  US govt says Americans lost record $12.5 billion to fraud in 2024 lulagain 3 703 04-07-2025, 01:33 AM
Last Post: Declassified
  Browser-native ransomware may be the next billion-dollar threat? lulagain 3 294 03-31-2025, 11:21 AM
Last Post: Dazz
  VSCode extensions found downloading early-stage ransomware lulagain 0 244 03-20-2025, 09:43 PM
Last Post: lulagain
  Mother of all breaches reveals 26 billion records: what we know so far Johny555 86 13,840 03-09-2025, 09:39 PM
Last Post: Rickkuyu
  Nearly 12,000 API keys and passwords found in AI training dataset lulagain 2 608 03-05-2025, 01:19 PM
Last Post: scitech

Forum Jump:


 Users browsing this thread: 1 Guest(s)