Undocumented 'Backdoor' Found In Chinese Bluetooth Chip Used By a Billion Devices.
Submitted 1 day ago by Tea@programming.dev to technology@lemmy.zip
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
Submitted 1 day ago by Tea@programming.dev to technology@lemmy.zip
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
CaptainBasculin@lemmy.bascul.in 1 day ago
Considering ESP32 is used practically everywhere on IoT devices, that’s really concerning.
notanapple@lemm.ee 1 day ago
I saw a comment somewhere that to exploit this a person has to be physically in the area (i think it was in a radius of few meters iirc). Thats not much better i guess since its not had to be around random iot devices but it at least prevents mass attacks (if true).
rumba@lemmy.zip 17 hours ago
Sounds like the attack is Bluetooth based itself.
So if somebody has command and control over any IoT device with Bluetooth…
MrTolkinghoen@lemmy.zip 1 day ago
I really haven’t seen any details. Most comments I’ve read indicate they think you already have to have access to the device and that this is just undocumented opcode calls. I.e. not a remote Bluetooth stack issue or remotely exploitable.
Given an opcode, as noted in the article (vague on details) and yes, I did read it. This doesn’t give me much cause for alarm.