Replies: 6 comments
-
See Espressif's response here as well as the technical blog post they link in that response here. In short, what I gather from those responses this doesn't seem to be a backdoor or big security issue, merely a few undocumented debugging commands in the BLE stack that can be called by code already running on the ESP32 (which means in case of MicroPython usually your own code), nothing that can be triggered remotely. |
Beta Was this translation helpful? Give feedback.
-
It's like complaining that a modem offers the ability to dial. So they have found out that you can execute proprietary commands via HCI. This assumes that the hacker already has access to the ESP32. This cannot be abused via OTA. This sensationalism is getting worse and worse. |
Beta Was this translation helpful? Give feedback.
-
I suggest to change this to a Discussion |
Beta Was this translation helpful? Give feedback.
-
Thx for the links and for looking into it! Feel free to change it to a discussion. |
Beta Was this translation helpful? Give feedback.
-
The original researcher's presentation slides don't call it a backdoor, only the press release called it this and they've since corrected it. But calling it a backdoor did get them a lot of attention... For the technical details, suggest reading the links @DvdGiessen posted above. If you want to read something written by a third party expert, then suggest https://darkmentor.com/blog/esp32_non-backdoor/ .
This doesn't pose any security risk for any of the common uses of MicroPython on ESP32, including writing Bluetooth code in Python. The only case where it could be a security risk is if someone does all the following things:
If all these conditions are true and an attacker gains control of the attached host somehow, they can use the exposed wired HCI command interface to also modify the ESP32 in a way that's not otherwise possible. I assume this will be patched in the next ESP-IDF release, which MicroPython will then support. For everyone else using MicroPython on ESP32 in any other way, this security research doesn't change anything. |
Beta Was this translation helpful? Give feedback.
-
From the researchers article (https://www.tarlogic.com/news/hidden-feature-esp32-chip-infect-ot-devices/):
It seems the press release did shoot too far. |
Beta Was this translation helpful? Give feedback.
-
Port, board and/or hardware
esp32
MicroPython version
No response
Issue Report
There is a recent report from Tarlogic about undocumented commands on the ESP32. At first they did call it backdoor but changed to feature - possibly for legal reasons:
https://www.tarlogic.com/news/hidden-feature-esp32-chip-infect-ot-devices/
Code of Conduct
Yes, I agree
Beta Was this translation helpful? Give feedback.
All reactions