Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Privacy
  3. Undocumented "backdoor" found in Bluetooth chip used by a billion devices

Undocumented "backdoor" found in Bluetooth chip used by a billion devices

Scheduled Pinned Locked Moved Privacy
privacy
16 Posts 12 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • thetechnician27@lemmy.worldT [email protected]

    The discoverers themselves refer to it as a backdoor, so frankly I don't know what you're on about accusing this article of misrepresenting their findings.

    ? Offline
    ? Offline
    Guest
    wrote on last edited by
    #5

    Huh, that is interesting. Though, that post doesn't seem to have any info about what the backdoor is either.

    Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. [...] This discovery is part of the ongoing research carried out by the Innovation Department of Tarlogic on the Bluetooth standard. Thus, the company has also presented at RootedCON, the world’s largest Spanish-language cybersecurity conference, BluetoothUSB, a free tool that enables the development of tests for Bluetooth security audits regardless of the operating system of the devices. [Emphasis mine.]

    Maybe the presentation has nothing to do with the actual backdoor?

    Though, this part later might seem to imply they are related:

    In the course of the investigation, a backdoor was discovered in the ESP32 chip, [...] Tarlogic has detected that ESP32 chips [...] have hidden commands not documented by the manufacturer. These commands would allow modifying the chips arbitrarily to unlock additional functionalities, [...].

    Which, best I can work out, seems to be talking about the information on slide titled "COMANDOS OCULTOS" (page 39 / "41").

    If the "backdoor" is the couple of commands in red on that slide, I maintain what I said above. If it's not talking about that and there's another "backdoor" that they haven't described yet, well, then ¯\_(ツ)_/¯ we'll see what it is when they actually announce it.

    I fully acknowledge there may be something I'm missing. If there's a real vuln/backdoor here, I'm sure we'll hear more about it.

    ? 1 Reply Last reply
    0
    • N [email protected]

      Please correct if inaccurate, but I don't see in that article where the folks at Espressif refer to it as a backdoor, only the security company. This seems to me as though it is no more vulnerable than any other device which can be compromised by physical access, which is most of devices. The vulnerability really looks to be more in the ability to pivot to other devices remotely after one has been compromised physically, which isn't ideal, but still doesn't seem to me to be any less secure than most other devices.

      ? Offline
      ? Offline
      Guest
      wrote on last edited by
      #6

      I mean, if it were a backdoor, the one thing you can be sure of is that the people who put it there wouldn't be calling it a backdoor, ever.

      Though, I think it's worth pointing out that the while the security company's blog calls whatever it is a "backdoor", "backdoor" (nor "puerta" (though, I have no idea if that would be translated literally or to something else)) doesn't appear in the the slides. So I'm going to lay that one at the marketing people trying to drum it up into something more impressive than it really is.

      1 Reply Last reply
      0
      • vk6flab@lemmy.radioV [email protected]
        This post did not contain any content.
        P This user is from outside of this forum
        P This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #7

        It's mostly a nothing burger. You basically need to have code already running on the chips. It's less of a backdoor and more of just an undocumented function. That may sound scary but it's rather common in production chips. In some ways it's a good thing, it means there are now more possibilities for messing with the chip and doing fun stuff with it.

        1 Reply Last reply
        0
        • ? Guest

          Huh, that is interesting. Though, that post doesn't seem to have any info about what the backdoor is either.

          Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. [...] This discovery is part of the ongoing research carried out by the Innovation Department of Tarlogic on the Bluetooth standard. Thus, the company has also presented at RootedCON, the world’s largest Spanish-language cybersecurity conference, BluetoothUSB, a free tool that enables the development of tests for Bluetooth security audits regardless of the operating system of the devices. [Emphasis mine.]

          Maybe the presentation has nothing to do with the actual backdoor?

          Though, this part later might seem to imply they are related:

          In the course of the investigation, a backdoor was discovered in the ESP32 chip, [...] Tarlogic has detected that ESP32 chips [...] have hidden commands not documented by the manufacturer. These commands would allow modifying the chips arbitrarily to unlock additional functionalities, [...].

          Which, best I can work out, seems to be talking about the information on slide titled "COMANDOS OCULTOS" (page 39 / "41").

          If the "backdoor" is the couple of commands in red on that slide, I maintain what I said above. If it's not talking about that and there's another "backdoor" that they haven't described yet, well, then ¯\_(ツ)_/¯ we'll see what it is when they actually announce it.

          I fully acknowledge there may be something I'm missing. If there's a real vuln/backdoor here, I'm sure we'll hear more about it.

          ? Offline
          ? Offline
          Guest
          wrote on last edited by
          #8

          Maybe we can find out for sure through the magic of the fediverse...

          @[email protected] Is the "backdoor" mentioned in https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/ about what you shared in your RootedCON talk? If so, how worried should people using devices containing ESP32s be?

          F 1 Reply Last reply
          0
          • vk6flab@lemmy.radioV [email protected]
            This post did not contain any content.
            N This user is from outside of this forum
            N This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #9

            TLDR:

            They found debugging commands that can be used to access the memory of the device over USB. This is as much a backdoor as any device that runs unsigned firmware

            Unless you store secret files on your Bluetooth dongle, you shouldn't have to worry about this.

            clonedhuman@lemmy.worldC ? 2 Replies Last reply
            0
            • ? Guest

              Maybe we can find out for sure through the magic of the fediverse...

              @[email protected] Is the "backdoor" mentioned in https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/ about what you shared in your RootedCON talk? If so, how worried should people using devices containing ESP32s be?

              F This user is from outside of this forum
              F This user is from outside of this forum
              [email protected]
              wrote on last edited by
              #10

              None. People that have physical access to you device can write malicious firmware. Which they can already do with physical access

              It's an overblown nothing-burger. Calling it a backdoor is a security researcher juicing up some minor finding

              1 Reply Last reply
              0
              • vk6flab@lemmy.radioV [email protected]
                This post did not contain any content.
                zerush@lemmy.mlZ This user is from outside of this forum
                zerush@lemmy.mlZ This user is from outside of this forum
                [email protected]
                wrote on last edited by
                #11

                Nothing new, this is why I always use devices with cable (keyboard, mouse, headphones....). It's somewhat less comfortable as with Bluetooth, but way more safe and stable.

                A 1 Reply Last reply
                0
                • N [email protected]

                  TLDR:

                  They found debugging commands that can be used to access the memory of the device over USB. This is as much a backdoor as any device that runs unsigned firmware

                  Unless you store secret files on your Bluetooth dongle, you shouldn't have to worry about this.

                  clonedhuman@lemmy.worldC This user is from outside of this forum
                  clonedhuman@lemmy.worldC This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #12

                  Thanks for the clarification because that headline sure is worrisome.

                  1 Reply Last reply
                  0
                  • vk6flab@lemmy.radioV [email protected]
                    This post did not contain any content.
                    S This user is from outside of this forum
                    S This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #13

                    Billions of devices? Is this bluetooth chip made by the Java people?

                    1 Reply Last reply
                    0
                    • vk6flab@lemmy.radioV [email protected]
                      This post did not contain any content.
                      C This user is from outside of this forum
                      C This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #14

                      https://www.espressif.com/en/news/Response_ESP32_Bluetooth

                      Espressif released a statement about it. It's basically a debug function for internal use. It can't actually do anything you couldn't do via other means, with that level of access.

                      1 Reply Last reply
                      0
                      • zerush@lemmy.mlZ [email protected]

                        Nothing new, this is why I always use devices with cable (keyboard, mouse, headphones....). It's somewhat less comfortable as with Bluetooth, but way more safe and stable.

                        A This user is from outside of this forum
                        A This user is from outside of this forum
                        [email protected]
                        wrote on last edited by
                        #15

                        Yes I always worry about people listening to my Bluetooth headphones.

                        1 Reply Last reply
                        0
                        • N [email protected]

                          TLDR:

                          They found debugging commands that can be used to access the memory of the device over USB. This is as much a backdoor as any device that runs unsigned firmware

                          Unless you store secret files on your Bluetooth dongle, you shouldn't have to worry about this.

                          ? Offline
                          ? Offline
                          Guest
                          wrote on last edited by
                          #16

                          It's not even over USB by default. It's an internal binary driver API. The USB part is a custom firmware for the ESP that exposes that api via USB that the people giving the talk wrote because it's useful for pentesting / development of exploits for other Bluetooth devices.

                          1 Reply Last reply
                          0
                          • System shared this topic on
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups