this post was submitted on 11 Mar 2025
42 points (100.0% liked)

Technology

68672 readers
3612 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 6 comments
sorted by: hot top controversial new old
[–] Korkki@lemmy.ml 28 points 1 month ago (1 children)

In such a system, the ESP32 fully trusts the host. If an attacker maliciously gains control over the host system, they could potentially issue these debug commands to influence ESP32’s behavior. However, an attacker must first compromise the host device, making this a second-stage attack vector rather than a standalone vulnerability. Or, gain a physical access to the device to send the HCI commands over serial interface.

Does this even count as backdoor? Not really if you have to have access to the device in the first place.

https://www.youtube.com/watch?v=ndM369oJ0tk

[–] partial_accumen@lemmy.world 5 points 1 month ago (2 children)

It certainly opens up lost of "evil maid" attacks.

[–] NeoNachtwaechter@lemmy.world 14 points 1 month ago (1 children)

An ESP32 is a powerful thing, but it is also a microcontroller.

They are programmable as soon as you have physical access. They are NOT like whole PC's that you can lock up with passwords etc.

More like a gun that you can fire as soon as you have physical access.

I wonder where the expectation has come from? People seem to think that it should be different than it is.

[–] pelya@lemmy.world 5 points 1 month ago

That's because the article that started the whole argument tried very hard to present an expected behavior for embedded chips as a security hole.

[–] JWBananas@lemmy.world 1 points 1 month ago

Does it? The quoted passage is also in reference to a less commonly used configuration, in which it is basically used as a communications coprocessor.

[–] MangoPenguin@lemmy.blahaj.zone 4 points 1 month ago

I'm all for embedded stuff having backdoors, it's what makes it possible to use custom firmware on devices that have otherwise crappy vendor locked firmware.