this post was submitted on 08 Mar 2025
1117 points (100.0% liked)

Technology

67050 readers
4433 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Source Link Privacy.Privacy test result

https://themarkup.org/blacklight?url=https%3A%2F%2Fwww.tarlogic.com%2Fnews%2Fbackdoor-esp32-chip-infect-ot-devices%2F&device=mobile&location=us-ca&force=false

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

Update: The ESP32 "backdoor" that wasn't.

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 210 points 1 week ago (1 children)

Well... Shit.

There are so, so, so, many ESP32's in not just my house, but practically everyone I know.

There outta be fines for this BS.

[–] [email protected] 180 points 1 week ago (13 children)

You're fine. This isn't something that can be exploited over wifi. You literally need physical access to the device to exploit it as it's commands over USB that allow flashing the chip.

This is a security firm making everything sound scary because they want you to buy their testing device.

[–] [email protected] 86 points 1 week ago (3 children)

You literally need physical access to the device to exploit it

You don't need physical access. Read the article. The researcher used physical USB to discover that the Bluetooth firmware has backdoors. It doesn't require physical access to exploit.

It's Bluetooth that's vulnerable.

https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/

[–] [email protected] 79 points 1 week ago (1 children)

I just re-read the article and yes, you still need physical access.

The exploit is one that bypasses OS protections to writing to the firmware. In otherwords, you need to get the device to run a malicious piece of code or exploit a vulnerability in already running code that also interacts with the bluetooth stack.

The exploit, explicitly, is not one that can be carried out with a drive-by Bluetooth connection. You also need faulty software running on the device.

[–] [email protected] 22 points 1 week ago (1 children)

"Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections."

I of course don't know details but I'm basing my post on that sentence. "Backdoor may be possible via ... rogue Bluetooth connections."

[–] [email protected] 75 points 1 week ago (3 children)

Looking at the article, the exploit requires you to be able to send arbitrary data to the Bluetooth device over a physical connection. This means that a properly secure application will be protected from drive by connections, but if the application has an exploit that either lets an attacker write arbitrary values to the Bluetooth controller, or more likely contains a general arbitrary code execution exploit, then you could use this to rewrite values to the chip that would let you "persist" certain changes to the Bluetooth chip that would be difficult to notice.

I would consider this a moderate concern, as this will definitely increase your options if you're looking to be able to make an attack that targets a specific device and this gives you a few additional persistence options, but any attack would have to be designed for a particular program running connected to a Bluetooth chip.

A more likely concern in my opinion would be the possibility of a supply chain attack, where someone compromises a Bluetooth chip that they know will be used to construct a particular part.

I don't think that it's super likely that either of these will affect the average person, only corporations and governments where espionage is an actual threat, as if you can find a Bluetooth IOT device that you want to mess with, like a Bluetooth enabled door lock, then you're more likely to be able to find an arbitrary code execution attack which causes it to unlock immediately. Being able to spoof a different Bluetooth device isn't likely to give you that big of an advantage when you're working with a device that was already vulnerable for a different reason.

load more comments (3 replies)
[–] [email protected] 31 points 1 week ago

Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections.

I really wish these articles just tell us what these scenarios are. I understand companies need publicity or need to sell software but if it isn't replicatable and the article says "might be possible" it kind of sounds like a secuity sales pitch.

This is especially the case if an attacker already has root access, planted malware, or pushed a malicious update on the device that opens up low-level access.

This part basically sounds more like a software issue where the attacker has a way in already. The system is already vulernable at this point before using the exploit found.

I don't think there's enough information out yet.

It is very interesting though.

load more comments (1 replies)
[–] [email protected] 14 points 1 week ago (1 children)

I do have a few outside. Probably not the best security-wise. Haha. Those are the first to get patched when one comes out.

[–] [email protected] 34 points 1 week ago (3 children)

Security wise, unless you are being specifically targeted by someone, you are almost certainly fine. And if you are being specifically targeted, I think someone hacking your ESPs is the least of your worries. A malicious attacker that knows your physical location can do a lot more scary things than just spying through ESPs.

load more comments (3 replies)
load more comments (11 replies)
[–] [email protected] 145 points 1 week ago (4 children)

We really should be pushing for fully open source stack (firmware, os) in all iot devices. They are not very complicated so this should be entirely possible. Probably will need a EU law though.

[–] [email protected] 26 points 1 week ago (2 children)

I 100% believe firmware should be open source no question about it. There's so many devices out there especially phones and iot devices that just become e-waste because you can't do anything with it once it's not supported if it was open source and documented in some way then it could be used. I have like five cheap phones that I got because they were so cheap but once they lost support they've become completely useless even though they still work.

load more comments (2 replies)
[–] [email protected] 20 points 1 week ago (2 children)

Open source stack will not prevent this. It's not even a backdoor, it's functionality that these researches think should be hidden from programmers for whatever reason.

Open source devices would have this functionality readily available for programmers. Look at rtl-sdr, using the words of these researches, it has a "backdoor" where a TV dongle may be used to listen to garage key fobs gasp everyone panic now!

load more comments (2 replies)
load more comments (2 replies)
[–] [email protected] 108 points 1 week ago

I hate it when an attacker who already has root access to my device gets sightly more access to the firmware. Definitely spin up a website and a logo, maybe a post in Bloomberg.

[–] [email protected] 88 points 1 week ago (1 children)

This sounds like there are some undocumented opcodes on the HCI side -- the Host Computer Interface -- not the wireless side. By itself, it's not that big a deal. If someone can prove that there's some sort of custom BLE packet that gives access to those HCI opcodes wirelessly, I'd be REALLY concerned.

But if it's just on the host side, you can only get to it if you've cracked the box and have access to the wiring. If someone has that kind of access, they're likely to be able to flash their own firmware and take over the whole device anyway.

Not sure this disclosure increases the risk any. I wouldn't start panicking.

[–] [email protected] 14 points 1 week ago (2 children)

So explained to me, a tech illiterate in comparison, this is China bad scaremongering?
'Backdoor' sounds malicious with intent.

[–] [email protected] 18 points 1 week ago* (last edited 1 week ago) (3 children)

The article is a security company trying to hype their company with a theoretical attack that currently has no hypothetical way to be abused

The article has an update now fixing the wording to "hidden feature" but, spoilers, every BT device has vendor specific commands.

The documentation of the part just wasn't complete and this companies "fuzzing" tool found some vendor commands that weren't in the data sheet

The China part just came from OP

load more comments (3 replies)
[–] [email protected] 18 points 1 week ago* (last edited 1 week ago) (2 children)

Pull up a chair and pour yourself a stiff beverage...

TLDR: Don't Panic.

If you have a regular old processor (MCU) and want to give it wireless capability, you can buy a wireless chip and stick it next to the processor, then have the MCU talk to it through a wired connection (typically UART or SPI). Think of it as the old ATDT commands that had your PC control your old screeching modems.

To standardize this communication protocol, folks came up with the Host Controller Interface (HCI) so you didn't have to reinvent that protocol for every new chip. This was handy for people on the MCU side, since they could write firmware that worked with any wireless chip out there, and could swap out for a cheaper/faster one with minimal change.

Fast forward to the era of integrated MCU+wireless, where you had a little ARM or other lightweight processor plus a little radio, and the processor could run programs in a high-level API that abstracted out the low level wireless stuff. Plus, you could use the same radio for multiple wireless protocols, like BLE, wifi, ANT, etc. Nordic and TI were early adopters of this method.

Typically, it was the vendor's own processor talking to their own wireless module, but they still implemented the full HCI interface and let it be accessed externally. Why? So if your design needed an extra beefy processor and used the MCU+wireless chip as a simple communication module, this would still work. The teeny MCU could be used to run something extra in parallel, or it could just sit idle. A typical example could be a laptop or cell phone. The little MCU is too small for everything else, so you pair it with a big chip and the big chip drives the little chip through HCI.

Sure, it would be cheaper if you just went with a basic 'dumb' wireless chip, as folks from CSR, Broadcom, and Dialog kept pointing out. But the market demanded integrated chips so we could have $10 activity trackers, fancy overpriced lightbulbs, and Twerking Santas (https://www.amazon.com/twerking-santa-claus/s?k=twerking+santa+claus).

For integrated MCU+wireless chips, most vendors didn't release the super low-level firmware that ran between them. There was no need. It was internal plumbing. They exposed SDKs so you could control the wireless chip, or high-level Bluetooth/wifi APIs so you could connect and talk to the outside world in a few lines of code. These SDKs were unique to each vendor (like Nordic's nRF Connect library, or TI's SimpleLink SDK).

Then along came Espressif out of Shanghai, China with a combo chip (ESP8266) that offered processor + wifi and was so cheap and easy to program that it took the hobbyist market by storm. Oh, god... so many LED light strips, perfect for Christmas and blinky EDM lightup outfits (hello, Adafruit: https://www.adafruit.com/category/65).

Fast forward and Espressif drops the ESP32. A bigger, faster Tensilica Xtensa processor, with built-in flash storage, plus wifi, Bluetooth, and BLE in one place. Plus lots of peripherals, busses, and IO pins. Also, running FreeRTOS and eventually Arduino SDKs, and MicroPython. All for less than $5! It took off like a rocket. So many products. Plus, you could run them as little webservers. Who doesn'l love a little webserver in their pocket?

It's gone through a few variations, including swapping out the Tensilica with an open-source RISC-V MCU, but otherwise it's a massive seller and the gateway drug for most IoT/Smarthome nerds.

So along come these Tarlogic researchers, looking to build a direct USB to bluetooth library. This way, you can drive the wireless from, say Linux, directly. There are already BLE to USB stacks, but this one is giving access at the HCI level, in a C library. Handy if you're doing research or developing drivers, but not the sort of thing your typical DIY person needs.

As part of their process, the researchers decide to dump the really low level ESP32 firmware and reverse engineer it.

A typical HCI implementation is a giant event loop that handles HCI opcodes and parameters. Host wants to talk to the outside world, it sets up some registers, configures the unique MAC address, then opens a channel and starts sending/receiving (hopefully without the modem screeching tones). There are typical packet encoders and decoders, multiple ISO/TCP layers, and the sort of thing that most people assume somebody else has gotten right.

For fancier implementations, there may be interrupt or DMA support. Sometimes, there's a multi-tasking part under the hood so they can time-slice between wifi, bluetooth, and ble (aka Fusion or Coexistence support). Not that you should care. The internals of this stuff is usually nobody's business and the vendors just include a binary blob as part of their SDK that handles things. The host systems just talk HCI. The wireless side talks HCI on the wired side, and wireless on the radio side. Everyone's happy.

In the process of reverse engineering the low-level HCI blob, these researchers found a few extra undocumented HCI opcodes. They're not sure what they're for, but according to their presentation (https://www.documentcloud.org/documents/25554812-2025-rootedcon-bluetoothtools/) if my super rusty Spanish holds up, it has to do with setting MAC addresses and handling low-level Link-Level Control Protocol communications (https://www.ellisys.com/technology/een_bt10.pdf).

Now in an of itself, this is no big deal. ESP32s already let you easily set your own temporary MAC address (https://randomnerdtutorials.com/get-change-esp32-esp8266-mac-address-arduino/), so there has to be a way to override the manufacturer one. And LLCP management is a totally geeky low-level thing that the MCU needs when handling wireless packets. There are perfectly good reasons why the opcodes would be there and why Espressif may not have documented them (for example, they could be used only during manufacturing QA).

So the original presentation is a teeny bit of an exaggeration. Yes, the opcodes exists. But are they nefarious? Should we stick all our ESP32s inside Faraday cages? Is this a secret plan for the CCP to remotely control our lights and plunge the world into chaos?

As I said before, ONLY if there's a secret as-yet-undiscovered wireless handshake that gives remote wireless access to these (or really, pretty much any other published HCI opcode). That presentation most definitely doesn't claim that.

To see if there is a REAL backdoor, you should wait for an analysis from fine professional wireless debugging vendors like Ellisys (starting models run $30K and up), Frontline, or Spanalytics.

Incidentally, Tarlogic, the group that put out that paper have their own BLE analyzer product (https://www.tarlogic.com/es/productos/analizador-bluetooth-le/). They look to know their stuff, so they should know better than putting out clickbait-y hair-on-fire reports. But come on, who can resist a good CCP/backdoor headline? Will media run with this and blow it out of proportion? No way!

If you've read this far, you must safely be on your third drink or the edible's just kicked in. Stop panicking, and wait until the pro sniffer and Bluetooth forum people give their opinions.

If it turns out there is an actual WIRELESS backdoor, then by all means, feel free to panic and toss out all your Smarthome plugs. Go ahead and revert to getting up and flicking on your light switch like a peasant. Have a sad, twerk-free Christmas.

But over a few undocumented HCI opcodes? Have another drink and relax.

Happy Sunday.

PS: controversy already up on wikipedia: https://en.m.wikipedia.org/wiki/ESP32

PPS: you may want to stock up on ESP32s for your light-up Christmas light project. Don't be surprised if Espressif gets smacked with some hard tariffs or an outright ban, based on these ragebait headlines 🤷🏻‍♂️

Edit: DarkMentor offers a little more detail on the nature of the opcodes: https://darkmentor.com/blog/esp32_non-backdoor/

load more comments (2 replies)
[–] [email protected] 87 points 1 week ago (2 children)

Too much fanfare and too little real info shared to be of any value. Sounds more like an ad than infosec

load more comments (2 replies)
[–] [email protected] 64 points 1 week ago (13 children)

The other day someone posted in Canada community that Canada should stop using Tesla cars and import Chinese cars. I replied saying, “That’s like replacing one evil with another.” I was downvoted by a lot of people. I should’ve expected it cuz a lot of people have short term memory.

[–] [email protected] 30 points 1 week ago (9 children)

Because that's not about privacy, that's about the trade war. Retaliatory tariffs on US cars increase cost of cars for Canadians, as there are almost no car assembled in Canada. Reducing or eliminating tariffs on cars from China would lower cost of new cars for Canadians while keeping the tariffs up.

For privacy and security, not a single new car on the market is decent right now. That should be regulated, but that's no concern for any politician at the moment.

load more comments (9 replies)
[–] [email protected] 14 points 1 week ago* (last edited 1 week ago) (2 children)

A lot of people are dumb. Or maybe because they feel offended because they are Chinese, but the reality is that every Chinese company is ultimately controlled by the CCP. If I was fighting a cold war, I would do the same. Sell compromised devices to my trade partners (AKA enemies) so I have leverage when I need it.

load more comments (2 replies)
load more comments (11 replies)
[–] [email protected] 60 points 1 week ago* (last edited 1 week ago) (1 children)

This isn't a backdoor. Just a company trying to make a name for themselves by sensationalizing a much smaller discovery.

[–] [email protected] 40 points 1 week ago (1 children)

Seriously this. Every single IC which has digital logic contains some number of undocumented test commands used to ensure it meets all the required specifications during production. They're not intended to be used for normal operation and almost never included in datasheets.

[–] [email protected] 24 points 1 week ago* (last edited 1 week ago)

If anyone's ever followed console emulator development, they know those undocumented commands are everywhere. There's still people finding new ones for the N64 hardware

Edit: I should say undocumented behavior, not necessarily new commands

[–] [email protected] 46 points 1 week ago* (last edited 1 week ago) (8 children)

This turned racist / xenophobic real quickly.

There have been several other posts about this without mentioning China at all, especially in the post itself.

No where in the article does it say "chinese", literally anywhere.

Check your racism.

Edited to remove where I stated it was manufactured. I did a quick search and found a couple mentions, but did not thoroughly check sourced. Apologies.

[–] [email protected] 32 points 1 week ago* (last edited 1 week ago) (3 children)

I agree we shouldn't be racist against Chinese people, but you're ignorant. From wikipedia: ESP32 is created and developed by Espressif Systems, a Chinese company based in Shanghai, and is manufactured by TSMC using their 40 nm process.It is a successor to the ESP8266 microcontroller.

So it's designed/developed in China and manufactured in Taiwan; not China.

load more comments (3 replies)
load more comments (7 replies)
[–] [email protected] 44 points 1 week ago (4 children)

I’d like to know if this is just a firmware update or unfixable, but sadly this seems just an ad rather than news

[–] [email protected] 28 points 1 week ago* (last edited 1 week ago) (3 children)

Here’s an article with a bit more detail… but I’m still unclear whether these backdoor commands are hardware circuits or firmware logic.

Bleeping Computer: Undocumented "backdoor" found in Bluetooth chip used by a billion devices

load more comments (3 replies)
load more comments (3 replies)
[–] [email protected] 39 points 1 week ago (5 children)

Please update the title of this post to mention the update

load more comments (5 replies)
[–] [email protected] 37 points 1 week ago (1 children)

Weird that they removed the reference to ESP32, one of the most common and widely known microcontrollers, from the headline.

load more comments (1 replies)
[–] [email protected] 30 points 1 week ago (6 children)

The Chinese adding back doors into their software/hardware.

Say it ain't so!

[–] [email protected] 24 points 1 week ago

Say it ain't so
Your bug is a heartbleeder
Say it ain't so
My NIC is a bytetaker

[–] [email protected] 19 points 1 week ago (7 children)

tech backdoors are only okay when us good guys require em

[–] [email protected] 16 points 1 week ago

China ain't our friend but neither is our own regime, I don't get the normies only caring about privacy and security when chinaman do the thing

Then they tuck their dicks because they got nothing to hide when domestic spook is doing the same

pathetic and intellectually disingenuous

load more comments (6 replies)
load more comments (4 replies)
[–] [email protected] 26 points 1 week ago (3 children)

Gotta blame China to get upvoted on Lemmy.

load more comments (3 replies)
[–] [email protected] 25 points 1 week ago (3 children)

Not the first time a backdoor was found on Chinese made hardware and it won‘t be the last time. Decoupling can‘t happen quickly enough.

[–] [email protected] 25 points 1 week ago (6 children)

Which government's backdoors would you prefer?

"We know you have a choice in oppressive governments, so we appreciate you choosing ours."

load more comments (6 replies)
[–] [email protected] 17 points 1 week ago (1 children)

True, but the ESP32 is used by a lot of devices. This backdoor is pretty huge in scope of devices impacted.

load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 23 points 1 week ago (5 children)

The rebuttal wasn't as comforting as some are making it out to be. They seem to be more interested in the semantics of it not being a backdoor tied to a specific product, which appears to be true.

Rather it is a potential for vulnerability that exists in all wireless implementation, which seems to me to be a bigger issue.

load more comments (5 replies)
[–] [email protected] 23 points 1 week ago (3 children)

Fukin dmnit! I just spent the last several months fine tuning a PCB design supporting this platform. I have , what i believe to be my last iteration, being sent to fab now. I have to look i to this. My solution isnt using bluetooth, so i dont know if im vulnerable.

[–] [email protected] 16 points 1 week ago* (last edited 1 week ago)

Its not a backdoor, you're most likely fine.

load more comments (2 replies)
[–] [email protected] 19 points 1 week ago

One more reason to have actual open-source drivers instead of binary blobs..

[–] [email protected] 18 points 1 week ago

Does anyone know where it is that we can find these new commands? I have an esp32 dev kit just a few feet away from me as i read this. It might be interesting to know what these new product "features" are.

[–] [email protected] 15 points 1 week ago (6 children)

I couldn’t find a list of devices. Anyone else find one?

[–] [email protected] 16 points 1 week ago (8 children)

The article is talking about the Espressif ESP32 micro controller (has Wi-Fi/Classic Bluetooth/BLE).

I don't know if the variants of this chip also have the same vulnerability (my guess is yes). As someone who works on this chip, I'm interested in more discourse on this matter.

load more comments (8 replies)
load more comments (5 replies)
load more comments
view more: next ›