this post was submitted on 08 Mar 2025
951 points (93.4% liked)

Technology

64936 readers
3977 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Source Link Privacy.Privacy test result

https://themarkup.org/blacklight?url=https%3A%2F%2Fwww.tarlogic.com%2Fnews%2Fbackdoor-esp32-chip-infect-ot-devices%2F&device=mobile&location=us-ca&force=false

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

Update: The ESP32 "backdoor" that wasn't.

(page 2) 50 comments
sorted by: hot top controversial new old
[–] NightCrawlerProMax@lemmy.world 46 points 1 day ago (22 children)

The other day someone posted in Canada community that Canada should stop using Tesla cars and import Chinese cars. I replied saying, “That’s like replacing one evil with another.” I was downvoted by a lot of people. I should’ve expected it cuz a lot of people have short term memory.

[–] Montreal_Metro@lemmy.ca 10 points 1 day ago* (last edited 1 day ago) (2 children)

A lot of people are dumb. Or maybe because they feel offended because they are Chinese, but the reality is that every Chinese company is ultimately controlled by the CCP. If I was fighting a cold war, I would do the same. Sell compromised devices to my trade partners (AKA enemies) so I have leverage when I need it.

Or maybe because they feel offended because they are Chinese

I'm Chinese-American and I'm not offended. The tankies from .ml are

load more comments (1 replies)
[–] Legume5534@lemm.ee 12 points 1 day ago

There's been a lot of that lately. Same here in New Zealand.

You dipshits, they're both the bad guys now.

load more comments (20 replies)
[–] Oisteink@feddit.nl 84 points 1 day ago (2 children)

Too much fanfare and too little real info shared to be of any value. Sounds more like an ad than infosec

[–] priapus@sh.itjust.works 2 points 19 hours ago

Exactly what it is. A gross example of company trying to get their name out their by sensationalizing their findings.

load more comments (1 replies)
[–] RmDebArc_5@sh.itjust.works 43 points 1 day ago (4 children)

I’d like to know if this is just a firmware update or unfixable, but sadly this seems just an ad rather than news

[–] ChaoticNeutralCzech@feddit.org 2 points 20 hours ago

There is nothing to "fix". Undocumented instructions have just been found in the silicon but they are not executable unless the ESP32's firmware their owner flashed to give it a purpose uses them. No pre-2025 firmware that we know of uses these instructions, and they might turn out to be buggy so compilers might not adopt them. If they turn out OK, the documentation of the instruction set will need an update, and compilers will be able to take advantage of the new instructions.

[–] badlotus@discuss.online 28 points 1 day ago* (last edited 1 day ago) (3 children)

Here’s an article with a bit more detail… but I’m still unclear whether these backdoor commands are hardware circuits or firmware logic.

Bleeping Computer: Undocumented "backdoor" found in Bluetooth chip used by a billion devices

load more comments (3 replies)
load more comments (2 replies)
[–] mechoman444@lemmy.world 25 points 1 day ago (12 children)

The Chinese adding back doors into their software/hardware.

Say it ain't so!

[–] Dekkia@this.doesnotcut.it 8 points 1 day ago (1 children)

It ain't so.

To use the "backdoor" an attacker needs to have full access to the esp32 powered device already.

It's like claiming that being able to leave your desk without locking your PC is a backdoor in your OS.

[–] ChaoticNeutralCzech@feddit.org 2 points 22 hours ago

Yes, this is about undocumented instructions found in the silicon but they are not executable unless the ESP32's firmware uses them. Firmware cannot be edited to use them unless you have an existing vulnerability such as physical access or insecure OTA in existing firmware (as far as researchers know).

It is good to question the "backdoor" allegations - maybe the instructions' microcode was buggy and they didn't want to release it.

[–] NaibofTabr@infosec.pub 23 points 1 day ago

Say it ain't so
Your bug is a heartbleeder
Say it ain't so
My NIC is a bytetaker

load more comments (10 replies)
[–] RememberTheApollo_@lemmy.world 12 points 1 day ago (6 children)

I couldn’t find a list of devices. Anyone else find one?

[–] embed_me@programming.dev 16 points 1 day ago (8 children)

The article is talking about the Espressif ESP32 micro controller (has Wi-Fi/Classic Bluetooth/BLE).

I don't know if the variants of this chip also have the same vulnerability (my guess is yes). As someone who works on this chip, I'm interested in more discourse on this matter.

load more comments (8 replies)
load more comments (5 replies)
[–] mp3@lemmy.ca 21 points 1 day ago

One more reason to have actual open-source drivers instead of binary blobs..

load more comments
view more: ‹ prev next ›