ESP32 Backdoor ─ via BT

I saw this article in a "newsfeed" --

ESP32 microchip has a backdoor

[i]Spanish researchers from Tarlogic Security revealed at RootedCON in Madrid that the ESP32’s hidden commands allow attackers to spoof trusted devices, access sensitive data, pivot across networks, and establish persistent malware infections on everything from smart locks to medical equipment. In other words, it’s a hacker’s dream and a security nightmare.

Tarlogic’s investigation uncovered 29 secret vendor-specific commands within the ESP32’s Bluetooth firmware, allowing low-level memory manipulation, MAC address spoofing, and packet injection.

These backdoor-like functions, accessed via Opcode 0x3F, grant attackers raw control over Bluetooth traffic, bypassing standard OS security layers.[/i]

That was debunked on another thread in this forum. ESP32 security no worse than any other IoT fantasy.

Or read about it here: The ESP32 Bluetooth Backdoor That Wasn’t | Hackaday

Please continue the discussion in the previous topic:

This topic was automatically closed 180 days after the last reply. New replies are no longer allowed.