Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
China Wireless Networking Hardware

Undocumented 'Backdoor' Found In Chinese Bluetooth Chip Used By a Billion Devices (bleepingcomputer.com) 71

"The ubiquitous ESP32 microchip made by Chinese manufacturer Espressif and used by over 1 billion units as of 2023 contains an undocumented 'backdoor' that could be leveraged for attacks," writes BleepingComputer.

"The undocumented commands allow spoofing of trusted devices, unauthorized data access, pivoting to other devices on the network, and potentially establishing long-term persistence." This was discovered by Spanish researchers Miguel Tarascó Acuña and Antonio Vázquez Blanco of Tarlogic Security, who presented their findings yesterday at RootedCON in Madrid. "Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices," reads a Tarlogic announcement shared with BleepingComputer. "Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls...."

Tarlogic developed a new C-based USB Bluetooth driver that is hardware-independent and cross-platform, allowing direct access to the hardware without relying on OS-specific APIs. Armed with this new tool, which enables raw access to Bluetooth traffic, Targolic discovered hidden vendor-specific commands (Opcode 0x3F) in the ESP32 Bluetooth firmware that allow low-level control over Bluetooth functions. In total, they found 29 undocumented commands, collectively characterized as a "backdoor," that could be used for memory manipulation (read/write RAM and Flash), MAC address spoofing (device impersonation), and LMP/LLCP packet injection.

Espressif has not publicly documented these commands, so either they weren't meant to be accessible, or they were left in by mistake.

Thanks to Slashdot reader ZipNada for sharing the news.

Undocumented 'Backdoor' Found In Chinese Bluetooth Chip Used By a Billion Devices

Comments Filter:
  • wat (Score:5, Insightful)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Saturday March 08, 2025 @03:54PM (#65220243) Homepage Journal

    Espressif has not publicly documented these commands, so either they weren't meant to be accessible, or they were left in by mistake.

    A back door is meant to be accessible, you're just not meant to know about it.

    • by Anonymous Coward

      That's what your mom said!
      (Sorry.)

    • by dfghjk ( 711126 )

      Yes, and then there's this quote:

      "Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls...."

      Exploitation of such an interface could allow an attacker with bluetooth access to an ESP32 device to gain control of that device. The rest of this is inflammatory horseshit. Computers and mobile phones do not use ESP32, IoT devices do, and

      • by ceoyoyo ( 59147 )

        Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections. ...
        In general, though, physical access to the device's USB or UART interface would be far riskier and a more realistic attack scenario.

        The article is a word salad, but it sounds like some guys wanted to hype their presentation at a hacker conference.

        • Clearly they want to promote the capabilities of their product, but it does seem like a previously unknown vulnerability.

          • by ceoyoyo ( 59147 )

            Well, they found unknown features. They might be a vulnerability. Calling it a backdoor seems quite a stretch, and I don't think I'd worry about it "permanently infecting" my medical equipment "by bypassing code audit controls."

            • The claim was that it would "would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls."

              Their presentation is in Spanish (you did look at it, right?) but they include Python code snippets that illustrate their findings.

      • Re:wat (Score:5, Informative)

        by ZipNada ( 10152669 ) on Saturday March 08, 2025 @05:07PM (#65220325)

        >> Computers and mobile phones do not use ESP32, IoT devices do, and many of those do not enable bluetooth

        I've done a fair amount of work with the ESP32. The device comes with an embedded RTOS, some black box firmware that runs all of the peripherals. You write code that interfaces with the RTOS via a set of 'documented' entry points, and that is how you indirectly access the Wifi and bluetooth functionality. These guys have discovered that there are a lot of undocumented commands that would presumably let a malicious programmer do the things that were described in the article.

        So the 'smart switch' you bought on Amazon that you plug into a wall socket and lets you control a lamp with Alexa or your cellphone could have shipped with some additional hidden functionality that sniffs out Bluetooth clients and masquerades as something it isn't. According to them it could then be "carrying out attacks of identity theft of devices" and "infer personal data such as names, addresses or telephone numbers".

        • by AmiMoJo ( 196126 )

          You could do most, if not all that stuff without this hack. Flipper Zero can do things like spoofing other devices.

          The reason the ESP32 is that way is because it's the only way to get WiFi/Bluetooth certification and be legal to sell in most countries. The software stack has to enforce things like legal limits on duty cycle and transmit power.

          • No doubt there are other ways to do it but as the article says, the ESP32 is "used by over 1 billion units as of 2023". Some of them may be in your house and attached to your WiFi network.

            • by AmiMoJo ( 196126 )

              Okay but this hack does nothing to affect the ones in your home already. The only way anyone could make use of it is to replace the firmware with their own, at which point it's already game over.

      • My concern is that the drivers are provided as blobs, and so there may be equivalent back doors in the WiFi PHY/stack. I think that there is a lot more visibility on WiFi, so it would be hard to hide a command and control system for years, but the CCP has a lot of patience.
    • Mista Puhtayduh Head! Backdoors are NOT secrets!
    • A back door is meant to be accessible, you're just not meant to know about it.

      Honestly calling this a back door is just silly. You need to have access to program the device in order to do anything. Supply chain attacks are not usually classed as back doors.

    • by gweihir ( 88907 )

      Actually, a "backdoor" not accessible from _outside_ of the system is not a backdoor. Seems somebody is lying by misdirection here to push their product.

  • by dfghjk ( 711126 ) on Saturday March 08, 2025 @04:01PM (#65220253)

    "Espressif has not publicly documented these commands, so either they weren't meant to be accessible, or they were left in by mistake."

    If they're going to call this a backdoor, they're already saying that it was neither a mistake nor not meant to be accessible.

    But we need to call it a backdoor because it's a Chinese company.

  • CVE? (Score:5, Insightful)

    by glowworm ( 880177 ) on Saturday March 08, 2025 @04:03PM (#65220255) Journal
    Is there actually a CVE, or is this just an advertisement for a nothing-burger?
    • They don't appear to claim that the undocumented features are actively being used in exploits, just that they could be.

    • by AmiMoJo ( 196126 )

      The latter it seems, and to be fair the actual talk doesn't seem out pitch it as a vulnerability, just a useful bit of exploration that opens up new functionality.

    • CVE-2025-27840. Severity 6.8 seems high for something that requires local privileged access, though.
    • by gweihir ( 88907 )

      Looks like "nothing-burger". Looks like not even a backdoor. Just some locally usable undocumented commands. Hence not even a security problem.

  • No other explanation (Score:5, Interesting)

    by hrieke ( 126185 ) on Saturday March 08, 2025 @04:15PM (#65220271) Homepage

    It's intentionally placed.
    Bluetooth circuits are usually licensed for pennies per million by the same companies that sold you the EDA tools (Cadence, Synopsys, etc).
    So then why?
    Sell at a loss, get placed in all the cheap phones, tablets, PCs in Asia, have instant backdoor access with a simple "knock-knock' packet.

    • Yeah, except given that it's not remotely executable without making up "knock-knock" in your head (the story mentions nothing about such an exploit), it doesn't track.

      When I make up all sorts of things I also make sure there's no other explanation. But back in reality the big risk here is a supply chain attack. That is actually incredibly boring since if you can execute a supply chain attack it really doesn't matter if you use an undocumented API or not. It's like a vulnerability which requires you to alrea

    • Or claimed data because of a lack of imagination.

      When creating a product you often put in methods to access data. Test support plumbing that might not be easily removed at the end (how can you test the final product if you're missing required parts?).

      My guess is they found something like that. Sometimes security is 'by obscurity'. A poor policy choice, but not uncommon.

      Or yeah, maybe it's a backdoor used by someone else (heck I'll bet the US and EU would frame China).

    • by gweihir ( 88907 )

      Only problem: On closer inspection, this is not a backdoor and not even really a vulnerability at all. All you can apparently do is give the ESP32 locally some undocumented commands.

  • by Wolfier ( 94144 ) on Saturday March 08, 2025 @04:47PM (#65220299)
    While they're at it, I suspect there are backdoor commands on the ESP 8266, or Teensy, or other microchips made in the same country. Maybe still OK to use for game controllers, toy robots, music generators, but I'd be extremely wary about using them for anything mission critical like door locks, or anything that can connect to your network.
  • Summary is misleading by giving the impression that devices that are not already compromised by malicious software are vulnerably to Bluetooth attack when this is probably not the case.
    From the https://reg.rootedcon.com/cfp/... [rootedcon.com] article
    "
    Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections.
    This is especially the case if an attacker already has root access, planted malware, or pushed a malicious update on the device that opens up low-level access.
    In general, though, physical access to the device's USB or UART interface would be far riskier and a more realistic attack scenario.
    "
    So these chips are probably not vulnerable to Bluetooth attacks unless the device is already infected with rogue software.
    There may be a vulnerability to local USB attacks which I guess would most likely be from police(or government intelligence agencies) trying to unlock/compromise a suspects phone.

    • So these chips are probably not vulnerable to Bluetooth attacks unless the device is already infected with rogue software.

      That's how I read this. However, the article states "remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections." Without at least the slides, let alone a proper paper, it's hard to comment intelligently on this reporting. If it's possible to gain access to some of this functionality via malformed packets which can be generated with some of these undocumented commands, then it could be used to add a persistent threat to the firmware of esp32 devices. If you h

    • by gweihir ( 88907 )

      Yep. Not a backdoor. A compromised device can compromise a connected ESP32 _locally_. That is not even interesting. That is _expected_ behavior.

  • Shocked (Score:2, Funny)

    I'm shocked, shocked [youtu.be] to find out that spying is going on in here.
  • Unclear (Score:4, Informative)

    by ebcdic ( 39948 ) on Saturday March 08, 2025 @06:15PM (#65220401)

    It's not that this is a backdoor at all. There are undocumented functions, but you need to have some malicious software already running to make use of them. That's true of the documented functions too. The linked article reads more like an advertisement.

    • by smurfi ( 91140 )

      I wouldn't be too sure about that. A backdoor implies that these rogue commands can be sent over Bluetooth. We're not simply talking undocumented API calls here.

    • by gweihir ( 88907 )

      Indeed. And undocumented commands in the ESP would only be a backdoor if they can be called from _outside_ directly. Otherwise this is local functionality and does not allow you to break in and hence is not a backdoor.

      I think the lack of detail information is telling. These people are probably trying to push their company by what is essentially lies.

  • It would be interesting to see when their CCP handler told them to put this in, obviously not in time to put it in hardware ... sloppy job.

  • 1. If this did 1/1000th of what they say, irresponsibly disclosing it during a talk at a conference is reprehensible.
    2. After looking at it, it doesn't do 1/1000th of what they say, so they're either liars, or in marketing. Either way they should be used as ballast on the next Starship launch.
    3. If this is this amazing, where's the CVE?
    4. Who's independently confirmed this?
    5. Who cares?
    6. I hope Expressif responds with an IBM of lawyers. These people disgust me.

    Yes, an IBM is a quantity of la
  • Seems like a bug in flashing or test mode.

    • Seems like a bug in flashing...

      I meant a mistake in creating the firmware flags answer for their exact device, maybe (like by whoever used the ESP32, or the researcher looking for problems to report).

  • The quality of security alerts has gone WAY down.

    This appears to be (after removing the panicy crud) a report that the CPU (in the micro-controller) can issue undocumented commands to the softMAC built in to the micro-controller.

    The wild panic is apparently that *I* might be able to load firmware on my own device that could potentially attack OTHER vulnerable devices, and NOT that other devices might use those commands against me.

    That's like sayong OH NOES, root might be able to do this complicated dance wi

    • by gweihir ( 88907 )

      Yep, my impression as well. If so, this is a total non-story. Even the "backdoor" claim would be a lie, because a backdoor must, by definition, be accessible from outside the security perimeter of the affected device.

  • Device masquerade via local software only? This has always been possible I thought? It has with with. Heck even on my phone I can edit the Mac address and appear as some other device GTFO with your "backdoor" bullshit
  • Who writes these deranged headlines? Backdoors are _always_ undocumented.

    As to the actual story: Is this commands that can be sent to an ESP32 over Bluetooth or are these local commands? The referenced story does not tell, which is very suspicious. My guess would be these are local commands and then the whole thing does not matter and is just one company trying to generate business by misdirection and FUD.

    Does anybody have more info?

  • As long as my noise cancelling headphones work in my shop I dont really care about exploits - any attacker wont be able hear himself think.
  • Every Chinese product is going to have a backdoor so they can float a large balloon over their target and see if they can exploit their planted backdoors somehow.

    I saw this day coming a mile off and found an alternative non-Chinese products to use. When does this behavior on China's part become unacceptable?

    And people still want to install TikTok on their phones??

  • I have 2 probably Chinese cameras to watch my baby. Had to give them my wifi password to install them. And I use the accompanying app to watch the video. They already know everything.

/usr/news/gotcha

Working...