Source Link Privacy.

Privacy test result

https://themarkup.org/blacklight?url=https%3A%2F%2Fwww.tarlogic.com%2Fnews%2Fbackdoor-esp32-chip-infect-ot-devices%2F&device=mobile&location=us-ca&force=false

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

Update: The ESP32 “backdoor” that wasn’t.

  • Ebby@lemmy.ssba.com
    link
    fedilink
    English
    arrow-up
    95
    ·
    1 day ago

    Well… Shit.

    There are so, so, so, many ESP32’s in not just my house, but practically everyone I know.

    There outta be fines for this BS.

    • cogman@lemmy.world
      link
      fedilink
      English
      arrow-up
      71
      arrow-down
      9
      ·
      1 day ago

      You’re fine. This isn’t something that can be exploited over wifi. You literally need physical access to the device to exploit it as it’s commands over USB that allow flashing the chip.

      This is a security firm making everything sound scary because they want you to buy their testing device.

        • IllNess@infosec.pub
          link
          fedilink
          English
          arrow-up
          12
          ·
          1 day ago

          Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections.

          I really wish these articles just tell us what these scenarios are. I understand companies need publicity or need to sell software but if it isn’t replicatable and the article says “might be possible” it kind of sounds like a secuity sales pitch.

          This is especially the case if an attacker already has root access, planted malware, or pushed a malicious update on the device that opens up low-level access.

          This part basically sounds more like a software issue where the attacker has a way in already. The system is already vulernable at this point before using the exploit found.

          I don’t think there’s enough information out yet.

          It is very interesting though.

        • cogman@lemmy.world
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          1
          ·
          1 day ago

          I just re-read the article and yes, you still need physical access.

          The exploit is one that bypasses OS protections to writing to the firmware. In otherwords, you need to get the device to run a malicious piece of code or exploit a vulnerability in already running code that also interacts with the bluetooth stack.

          The exploit, explicitly, is not one that can be carried out with a drive-by Bluetooth connection. You also need faulty software running on the device.

          • Blue_Morpho@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            1 day ago

            “Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections.”

            I of course don’t know details but I’m basing my post on that sentence. “Backdoor may be possible via … rogue Bluetooth connections.”

      • Ebby@lemmy.ssba.com
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 day ago

        I do have a few outside. Probably not the best security-wise. Haha. Those are the first to get patched when one comes out.

        • cogman@lemmy.world
          link
          fedilink
          English
          arrow-up
          25
          arrow-down
          1
          ·
          1 day ago

          Security wise, unless you are being specifically targeted by someone, you are almost certainly fine. And if you are being specifically targeted, I think someone hacking your ESPs is the least of your worries. A malicious attacker that knows your physical location can do a lot more scary things than just spying through ESPs.

          • Treczoks@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 day ago

            Just wait until a jester creates a software that sends an erase flash backdoor command to any BT device it sees.

      • tehmics@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 day ago

        In that case, how long til some open source project uses it to make a custom firmware to bypass the manufacturer bs and integrate my cheap IoTs seamlessly into Home assistant?

      • Treczoks@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        3
        ·
        1 day ago

        Wrong. Read the analysis. It is a BT vulnerability. One can probably design a cheap attack system that just sends a erase flash command to any BT device in reach, instantly bricking every BT enabled ESP32 device.

        • cogman@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 day ago

          Just reread it and no, it’s not a BT vulnerability. The “erase flash” command is something that has to be done by software running outside the BT stack. You can even see that inside the slides. The UsbBluetooth software is connected to the device with the flawed bluetooth chipset.

          The vulnerability is that if you have this chipset and compromised software, someone can flash the chipset with compromised flash. They even say that it’s not an easy attack to pull off in the article.

          In general, though, physical access to the device’s USB or UART interface would be far riskier and a more realistic attack scenario.

          In otherwords, the attack is something that can only be pulled off if there’s also a security vulnerability within other parts of the hardware stack.

  • Oisteink@feddit.nl
    link
    fedilink
    English
    arrow-up
    48
    arrow-down
    2
    ·
    1 day ago

    Too much fanfare and too little real info shared to be of any value. Sounds more like an ad than infosec

  • RmDebArc_5@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    28
    arrow-down
    1
    ·
    1 day ago

    I’d like to know if this is just a firmware update or unfixable, but sadly this seems just an ad rather than news

    • Ebby@lemmy.ssba.com
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 day ago

      Even if it were fixable, it would be up to manufacturers to push updates. I doubt any really care enough.

    • Treczoks@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 day ago

      It is not easy to determine how fixable this is. IIRC, the ESP32 has the wireless stack hidden from user space, and I am not sure if it is a blob included during link time, or if it is stored in a ROM of the chip. I do have the chips and the development enviroment in my studio, but (luckily) I decided to use a different chip for my project.

      But I know there is a load of systems using either the ESP32 as their main processor, or as an auxiliary processor to add WiFi or BT capabilities, so this really is a big oh shit moment.

  • CosmoNova@lemmy.world
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    3
    ·
    1 day ago

    Not the first time a backdoor was found on Chinese made hardware and it won‘t be the last time. Decoupling can‘t happen quickly enough.

    • surewhynotlem@lemmy.world
      link
      fedilink
      English
      arrow-up
      19
      arrow-down
      7
      ·
      1 day ago

      Which government’s backdoors would you prefer?

      “We know you have a choice in oppressive governments, so we appreciate you choosing ours.”

      • starman2112@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 day ago

        None of them, that’s why the only things in my house that connect to the internet are my computers, game consoles, and cell phone

          • starman2112@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            3
            arrow-down
            1
            ·
            edit-2
            1 day ago

            Obviously, but I trust my Linux mint laptop a hell of a lot better than my aunt’s XIPPLG branded wifi cat feeder that she bought off Amazon

    • randompasta@lemmy.today
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 day ago

      True, but the ESP32 is used by a lot of devices. This backdoor is pretty huge in scope of devices impacted.

      • earphone843@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        2
        ·
        1 day ago

        It depends on what the method of attack is. I’m not seeing anything saying that it would be possible to exploit wirelessly, so this could easily be mostly a non-issue.

    • Bear@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      1 day ago

      I mean, most users here are browsing using a device with an AMD or Intel CPU, both with known backdoors. Not the first time a backdoor was found on American made hardware and it won’t be the last.

  • m-p{3}@lemmy.ca
    link
    fedilink
    English
    arrow-up
    12
    ·
    1 day ago

    One more reason to have actual open-source drivers instead of binary blobs…

  • BJHanssen@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 day ago

    Yeah one of my more… tech adventurous friends had the most insane series of security breaches (to out it mildly) potentially related to this and some other recent ridiculousness.

  • mystik@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    1 day ago

    I have a bunch of ESP32’s that … I can update and replace the firmware on, if i reset it the right way with a usb cable. the web site doesn’t explain it any way how this is any worse than that…?

  • 60d@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    1 day ago

    The ESP32 chip, developed by Espressif Systems, is widely used in various IoT (Internet of Things), embedded systems, and consumer electronics due to its low power consumption, built-in Wi-Fi & Bluetooth, and high processing capability.


    Devices That Use the ESP32 Chip

    1. Development Boards & Microcontrollers

    ESP32 DevKit series (official Espressif boards)

    M5Stack and M5Stick series

    Adafruit HUZZAH32

    SparkFun ESP32 Thing

    LilyGO T-Series (T-Display, T-SIM, T-Watch, etc.)

    WEMOS Lolin D32/D32 Pro

    1. Smart Home & IoT Devices

    Sonoff Smart Switches and Plugs (e.g., Sonoff Mini R3, Sonoff S31)

    Shelly Smart Relays (e.g., Shelly 1, Shelly 2.5)

    Tuya-Based Smart Devices (many smart home products use Tuya firmware on ESP32)

    Air quality monitors (e.g., AirGradient open-source air sensors)

    IoT Sensor Hubs (various DIY and commercial solutions)

    1. Wearables & Portable Devices

    TTGO T-Watch (ESP32-based smartwatch)

    Heltec WiFi Kit Series (LoRa-enabled IoT devices)

    Fitness trackers (some DIY and prototype models)

    1. Robotics & DIY Electronics

    ESP32-CAM (ESP32-based camera module)

    DIY drones & robots (used in hobbyist and educational robotics)

    3D Printer controllers (e.g., ESP32-based Klipper controllers)

    1. Industrial & Commercial Products

    ESP32-based vending machines (wireless payment systems)

    Smart irrigation controllers

    Energy monitoring devices (e.g., OpenEnergyMonitor)

    Smart locks & security systems

    1. Audio & Multimedia Devices

    ESP32-based web radios

    DIY Bluetooth speakers

    Smart light controllers with voice assistants


    Why Is ESP32 Popular?

    ✔ Low-cost & powerful (dual-core, Wi-Fi, Bluetooth) ✔ Great for DIY & commercial IoT applications ✔ Strong developer community & open-source support ✔ Compatible with Arduino, MicroPython, ESP-IDF, etc.