• potatopotato@sh.itjust.works
    link
    fedilink
    arrow-up
    0
    ·
    1 day ago

    It’s mostly a nothing burger. You basically need to have code already running on the chips. It’s less of a backdoor and more of just an undocumented function. That may sound scary but it’s rather common in production chips. In some ways it’s a good thing, it means there are now more possibilities for messing with the chip and doing fun stuff with it.

  • azdle@news.idlestate.org
    link
    fedilink
    arrow-up
    0
    ·
    2 days ago

    What is this article on about?

    Here’s the actual presentation: https://www.documentcloud.org/documents/25554812-2025-rootedcon-bluetoothtools/

    I don’t speak Spanish and only have the slides to go off of, but this doesn’t sound like a “backdoor”. This sounds like they found the commands for regulatory testing. To do emissions testing you need to be able to make the device transmit on command so that your testing house can verify you’re within legal limits on everything.

    These are commands that can be given over USB. You know what else you can do over USB? Fucking anything, these chips have a JTAG USB device. (Now, if these are commands that can’t be turned off, that would be kinda bad, I guess? But still not really a super big problem. And I don’t see anything that implies that in the slides.)

    The tone I get from the slides is more “hey we found this cool tool for doing Bluetooth stuff that doesn’t require writing embedded software”. Which, cool. But that’s sure not the point this article is trying to make.

      • azdle@news.idlestate.org
        link
        fedilink
        arrow-up
        0
        ·
        1 day ago

        Huh, that is interesting. Though, that post doesn’t seem to have any info about what the backdoor is either.

        Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. […] This discovery is part of the ongoing research carried out by the Innovation Department of Tarlogic on the Bluetooth standard. Thus, the company has also presented at RootedCON, the world’s largest Spanish-language cybersecurity conference, BluetoothUSB, a free tool that enables the development of tests for Bluetooth security audits regardless of the operating system of the devices. [Emphasis mine.]

        Maybe the presentation has nothing to do with the actual backdoor?

        Though, this part later might seem to imply they are related:

        In the course of the investigation, a backdoor was discovered in the ESP32 chip, […] Tarlogic has detected that ESP32 chips […] have hidden commands not documented by the manufacturer. These commands would allow modifying the chips arbitrarily to unlock additional functionalities, […].

        Which, best I can work out, seems to be talking about the information on slide titled “COMANDOS OCULTOS” (page 39 / “41”).

        If the “backdoor” is the couple of commands in red on that slide, I maintain what I said above. If it’s not talking about that and there’s another “backdoor” that they haven’t described yet, well, then ¯\_(ツ)_/¯ we’ll see what it is when they actually announce it.

        I fully acknowledge there may be something I’m missing. If there’s a real vuln/backdoor here, I’m sure we’ll hear more about it.

      • nalinna@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        1 day ago

        Please correct if inaccurate, but I don’t see in that article where the folks at Espressif refer to it as a backdoor, only the security company. This seems to me as though it is no more vulnerable than any other device which can be compromised by physical access, which is most of devices. The vulnerability really looks to be more in the ability to pivot to other devices remotely after one has been compromised physically, which isn’t ideal, but still doesn’t seem to me to be any less secure than most other devices.

        • azdle@news.idlestate.org
          link
          fedilink
          arrow-up
          0
          ·
          1 day ago

          I mean, if it were a backdoor, the one thing you can be sure of is that the people who put it there wouldn’t be calling it a backdoor, ever.

          Though, I think it’s worth pointing out that the while the security company’s blog calls whatever it is a “backdoor”, “backdoor” (nor “puerta” (though, I have no idea if that would be translated literally or to something else)) doesn’t appear in the the slides. So I’m going to lay that one at the marketing people trying to drum it up into something more impressive than it really is.