Undocumented 'Backdoor' Found In Chinese Bluetooth Chip Used By a Billion Devices.
Submitted 3 days ago by Tea@programming.dev to technology@lemmy.zip
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
Submitted 3 days ago by Tea@programming.dev to technology@lemmy.zip
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
CaptainBasculin@lemmy.bascul.in 3 days ago
Considering ESP32 is used practically everywhere on IoT devices, that’s really concerning.
notanapple@lemm.ee 3 days ago
I saw a comment somewhere that to exploit this a person has to be physically in the area (i think it was in a radius of few meters iirc). Thats not much better i guess since its not had to be around random iot devices but it at least prevents mass attacks (if true).
MrTolkinghoen@lemmy.zip 3 days ago
I really haven’t seen any details. Most comments I’ve read indicate they think you already have to have access to the device and that this is just undocumented opcode calls. I.e. not a remote Bluetooth stack issue or remotely exploitable.
Given an opcode, as noted in the article (vague on details) and yes, I did read it. This doesn’t give me much cause for alarm.
rumba@lemmy.zip 2 days ago
Sounds like the attack is Bluetooth based itself.
So if somebody has command and control over any IoT device with Bluetooth…