The security researcher, LimitedResults, coordinated disclosure with Espressif on their advisory and details of the exploit. The attack works against eFuse, a one-time programmable memory where data can be burned to the device.
By burning a payload into the device’s eFuse, no software update can ever reset the fuse and the chip must be physically replaced or the device discarded. A key risk is that the attack does not fully replace the firmware, so the device may appear to work as normal.
Why does a random esp32 chip need efuses in the first place??
It’s designed and implemented for copy protection. Otherwise you can design a esp32 device that includes software you’ve written and 15 minutes later a clone device with exactly the same software will appear on <insert Chinese electronics website here>
I mostly understand how these fuses prevent say downgrading firmware, but could t a Chinese firm looking to clone one of these also just clone the number of blow. Fuses equally trivially if the goal is just an also working device with stock firmware?
Unless your lights are hard-wired or connecting to a locked down guest WiFi network, you are exposing your WiFi credentials to potential attackers.
The microcontrollers that control Christmas lights are riddled with backdoors and holes.
That’s probably the real reason that this piece of shit NSA spook wants everyone to have smart Christmas lights.
Why does a random esp32 chip need efuses in the first place??
It’s designed and implemented for copy protection. Otherwise you can design a esp32 device that includes software you’ve written and 15 minutes later a clone device with exactly the same software will appear on <insert Chinese electronics website here>
I mostly understand how these fuses prevent say downgrading firmware, but could t a Chinese firm looking to clone one of these also just clone the number of blow. Fuses equally trivially if the goal is just an also working device with stock firmware?