Get the latest tech news
Backdoor detected in ESP32 Espressif IoT chip
Tarlogic presents research revealing undocumented commands in the ESP32 microchip, present in millions of smart devices with Bluetooth
Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls. Thus, the company has also presented at RootedCON, the world’s largest Spanish-language cybersecurity conference, BluetoothUSB, a free tool that enables the development of tests for Bluetooth security audits regardless of the operating system of the devices. However, with the current tools, it is not possible to carry out comprehensive security audits of a Bluetooth device due to their lack of maintenance, dependence on the operating system and the fact that they require a multitude of specialized and expensive hardware.
Or read this on Hacker News