Undocumented 'Backdoor' Found In Chinese Bluetooth Chip Used By a Billion Devices.
Submitted 2 months ago by Tea@programming.dev to technology@lemmy.zip
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
Submitted 2 months ago by Tea@programming.dev to technology@lemmy.zip
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
CaptainBasculin@lemmy.bascul.in 2 months ago
Considering ESP32 is used practically everywhere on IoT devices, that’s really concerning.
notanapple@lemm.ee 2 months ago
I saw a comment somewhere that to exploit this a person has to be physically in the area (i think it was in a radius of few meters iirc). Thats not much better i guess since its not had to be around random iot devices but it at least prevents mass attacks (if true).
MrTolkinghoen@lemmy.zip 2 months ago
I really haven’t seen any details. Most comments I’ve read indicate they think you already have to have access to the device and that this is just undocumented opcode calls. I.e. not a remote Bluetooth stack issue or remotely exploitable.
Given an opcode, as noted in the article (vague on details) and yes, I did read it. This doesn’t give me much cause for alarm.
rumba@lemmy.zip 2 months ago
Sounds like the attack is Bluetooth based itself.
So if somebody has command and control over any IoT device with Bluetooth…