For those who program with electronics on IoT (internet of things)
devices, the ESP32 has 29 undocumented commands that could be used as
a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has
electronice in it.
For those who program with electronics on IoT (internet of things) devices, the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in it.
For those who program with electronics on IoT (internet of things) devices, the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in it.
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of things) devices, the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in it.
Chinese chip backdoors have been around for more than a dozen years: <http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
For those who program with electronics on IoT (internet of things) devices, the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in it.
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of things)
devices,
the ESP32 has 29 undocumented commands that could be used as a
‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-
found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has
electronice in
it.
Are you dealing in a way that would attract interest to the Chinese authorities.
Jeff Layman <Jeff@invalid.invalid> wrote:
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of things) devices, >>> the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in >>> it.
Chinese chip backdoors have been around for more than a dozen years:
<http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
That chip is by a US manufacturer.
Don't US ITAR rules prevent the US exporting encryption standards that
the US can't crack or don't have a back door access to the NSA etc? I
recall PGP's creator was nearly imprisoned.
On 10/03/2025 14:58, Theo wrote:
Jeff Layman <Jeff@invalid.invalid> wrote:
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of things) devices,
the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in
it.
Chinese chip backdoors have been around for more than a dozen years:
<http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
That chip is by a US manufacturer.
A Chinese company, but "fab less" so they get others to actually make
their chips. Currently TSMC do the bulk of it.
Their two main products (ESP32 and ESP8266) are very widely used in all
kinds of kit.
https://en.wikipedia.org/wiki/Espressif_Systems
John Rumm <see.my.signature@nowhere.null> wrote:
On 10/03/2025 14:58, Theo wrote:
Jeff Layman <Jeff@invalid.invalid> wrote:
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of things) devices,
the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in
it.
Chinese chip backdoors have been around for more than a dozen years:
<http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
That chip is by a US manufacturer.
A Chinese company, but "fab less" so they get others to actually make
their chips. Currently TSMC do the bulk of it.
Their two main products (ESP32 and ESP8266) are very widely used in all
kinds of kit.
https://en.wikipedia.org/wiki/Espressif_Systems
The paper cited refers to an Actel FPGA (HQ in San Jose) which was bought
by Microsemi (HQ Aliso Viejo California) which was bought by Microchip (HQ Chandler Arizona). Nothing to do with China.
On 10/03/2025 18:20, Theo wrote:
John Rumm <see.my.signature@nowhere.null> wrote:
On 10/03/2025 14:58, Theo wrote:
Jeff Layman <Jeff@invalid.invalid> wrote:
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of things) devices,
the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in
it.
Chinese chip backdoors have been around for more than a dozen years: >>>> <http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
That chip is by a US manufacturer.
A Chinese company, but "fab less" so they get others to actually make
their chips. Currently TSMC do the bulk of it.
Their two main products (ESP32 and ESP8266) are very widely used in all
kinds of kit.
https://en.wikipedia.org/wiki/Espressif_Systems
The paper cited refers to an Actel FPGA (HQ in San Jose) which was bought
Are you reading the right paper? I can see no mention of an FPGA.
Chinese chip backdoors have been around for more than a dozen years:
<http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
by Microsemi (HQ Aliso Viejo California) which was bought by Microchip (HQ Chandler Arizona). Nothing to do with China.
Ah, so that would be why Chinese head office posted a clarification
about it, and said they would remove the functionality then?
https://www.espressif.com/en/news/response_esp32_bluetooth
Now I would agree it is not in itself a backdoor. There is no risk of a bluetooth device external to the ESP32 using the chip capabilities to
attack other devices.
However there is scope for a malign actor to build a product (or more
likely coerce the maker of a product) to include (or "patch") firmware
on a device that uses one of the chips to carry out actions that are not
the advertised use, by making use of the debug facilities.
Think how many devices using these chips are in devices connected to the internet anyway and so are capable of downloading new firmware patches - possibly autonomously.
John Rumm <see.my.signature@nowhere.null> wrote:
On 10/03/2025 18:20, Theo wrote:
John Rumm <see.my.signature@nowhere.null> wrote:Are you reading the right paper? I can see no mention of an FPGA.
On 10/03/2025 14:58, Theo wrote:
Jeff Layman <Jeff@invalid.invalid> wrote:
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of things) devices,
the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in
it.
Chinese chip backdoors have been around for more than a dozen years: >>>>>> <http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
That chip is by a US manufacturer.
A Chinese company, but "fab less" so they get others to actually make
their chips. Currently TSMC do the bulk of it.
Their two main products (ESP32 and ESP8266) are very widely used in all >>>> kinds of kit.
https://en.wikipedia.org/wiki/Espressif_Systems
The paper cited refers to an Actel FPGA (HQ in San Jose) which was bought >>
I was replying to this comment from Jeff:
Chinese chip backdoors have been around for more than a dozen years: >>>>> <http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
which paper refers to an Actel ProASIC 3 FPGA.
by Microsemi (HQ Aliso Viejo California) which was bought by Microchip (HQ >>> Chandler Arizona). Nothing to do with China.
Ah, so that would be why Chinese head office posted a clarification
about it, and said they would remove the functionality then?
I think we're talking at cross purposes.
https://www.espressif.com/en/news/response_esp32_bluetooth
Now I would agree it is not in itself a backdoor. There is no risk of a
bluetooth device external to the ESP32 using the chip capabilities to
attack other devices.
Agreed.
However there is scope for a malign actor to build a product (or more
likely coerce the maker of a product) to include (or "patch") firmware
on a device that uses one of the chips to carry out actions that are not
the advertised use, by making use of the debug facilities.
Think how many devices using these chips are in devices connected to the
internet anyway and so are capable of downloading new firmware patches -
possibly autonomously.
While direct access to the Bluetooth memory is potentially troublesome, it depends whether this interface was ever a security boundary. Generally
these interfaces are not: you're running firmware on the chip that offers an API and it's assumed you have full control over it. Because it's not a security boundary, there's no particular gatekeeping of access via this API
- the API is just for convenience, and it's often possible to do the same things via the published API as it is via the unpublished API. It's only an API because it's a closed source component and that's the interface they publish. There was never any protection to stop you poking things from outside the closed source firmware library.
By analogy, it's like an extra hatch to the ventilation ducts inside your house that you didn't know about. If you have access to the ventilation ducts from other places, there's no problem with having another hatch - it doesn't change anything. As we know from Hollywood, it's only if you decide to keep hostages in the room with the secret hatch (ie make an internal security boundary) that the presence of the hatch becomes important.
On 11/03/2025 10:48, Theo wrote:
John Rumm <see.my.signature@nowhere.null> wrote:
On 10/03/2025 18:20, Theo wrote:
John Rumm <see.my.signature@nowhere.null> wrote:
On 10/03/2025 14:58, Theo wrote:
Jeff Layman <Jeff@invalid.invalid> wrote:
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of
things) devices,
the ESP32 has 29 undocumented commands that could be used as a >>>>>>>> ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-
commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has
electronice in
it.
Chinese chip backdoors have been around for more than a dozen years: >>>>>>> <http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
That chip is by a US manufacturer.
A Chinese company, but "fab less" so they get others to actually make >>>>> their chips. Currently TSMC do the bulk of it.
Their two main products (ESP32 and ESP8266) are very widely used in
all
kinds of kit.
https://en.wikipedia.org/wiki/Espressif_Systems
The paper cited refers to an Actel FPGA (HQ in San Jose) which was
bought
Are you reading the right paper? I can see no mention of an FPGA.
I was replying to this comment from Jeff:
Chinese chip backdoors have been around for more than a dozen years: >>>>>> <http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
which paper refers to an Actel ProASIC 3 FPGA.
by Microsemi (HQ Aliso Viejo California) which was bought by
Microchip (HQ
Chandler Arizona). Nothing to do with China.
Ah, so that would be why Chinese head office posted a clarification
about it, and said they would remove the functionality then?
I think we're talking at cross purposes.
Indeed - sorry had not spotted Jeff's paper.
https://www.espressif.com/en/news/response_esp32_bluetooth
Now I would agree it is not in itself a backdoor. There is no risk of a
bluetooth device external to the ESP32 using the chip capabilities to
attack other devices.
Agreed.
However there is scope for a malign actor to build a product (or more
likely coerce the maker of a product) to include (or "patch") firmware
on a device that uses one of the chips to carry out actions that are not >>> the advertised use, by making use of the debug facilities.
Think how many devices using these chips are in devices connected to the >>> internet anyway and so are capable of downloading new firmware patches - >>> possibly autonomously.
While direct access to the Bluetooth memory is potentially
troublesome, it
depends whether this interface was ever a security boundary. Generally
these interfaces are not: you're running firmware on the chip that
offers an
API and it's assumed you have full control over it. Because it's not a
security boundary, there's no particular gatekeeping of access via
this API
- the API is just for convenience, and it's often possible to do the same
things via the published API as it is via the unpublished API. It's
only an
API because it's a closed source component and that's the interface they
publish. There was never any protection to stop you poking things from
outside the closed source firmware library.
By analogy, it's like an extra hatch to the ventilation ducts inside your
house that you didn't know about. If you have access to the ventilation
ducts from other places, there's no problem with having another hatch
- it
doesn't change anything. As we know from Hollywood, it's only if you
decide
to keep hostages in the room with the secret hatch (ie make an internal
security boundary) that the presence of the hatch becomes important.
In general I would agree, although there is always scope for mischief
when bad actors realise they possibly have access to new capabilities on their collection of already compromised IoT devices.
On 11/03/2025 11:11, John Rumm wrote:
On 11/03/2025 10:48, Theo wrote:
John Rumm <see.my.signature@nowhere.null> wrote:
On 10/03/2025 18:20, Theo wrote:
John Rumm <see.my.signature@nowhere.null> wrote:
On 10/03/2025 14:58, Theo wrote:
Jeff Layman <Jeff@invalid.invalid> wrote:
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of
things) devices,
the ESP32 has 29 undocumented commands that could be used as >>>>>>>> a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented- >>>>>>>> commands-found-in-bluetooth-chip-used-by-a-billion-devices/> >>>>>>>>
IMO the takeaway is never to buy anthing from China that has >>>>>>>> electronice in
it.
Chinese chip backdoors have been around for more than a dozen
years:
<http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
That chip is by a US manufacturer.
A Chinese company, but "fab less" so they get others to
actually make their chips. Currently TSMC do the bulk of it.
Their two main products (ESP32 and ESP8266) are very widely
used in all
kinds of kit.
https://en.wikipedia.org/wiki/Espressif_Systems
The paper cited refers to an Actel FPGA (HQ in San Jose) which
was bought
Are you reading the right paper? I can see no mention of an FPGA.
I was replying to this comment from Jeff:
Chinese chip backdoors have been around for more than a dozen
years: <http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
which paper refers to an Actel ProASIC 3 FPGA.
by Microsemi (HQ Aliso Viejo California) which was bought by
Microchip (HQ
Chandler Arizona). Nothing to do with China.
Ah, so that would be why Chinese head office posted a
clarification about it, and said they would remove the
functionality then?
I think we're talking at cross purposes.
Indeed - sorry had not spotted Jeff's paper.
https://www.espressif.com/en/news/response_esp32_bluetooth
Now I would agree it is not in itself a backdoor. There is no
risk of a bluetooth device external to the ESP32 using the chip
capabilities to attack other devices.
Agreed.
However there is scope for a malign actor to build a product (or
more likely coerce the maker of a product) to include (or
"patch") firmware on a device that uses one of the chips to carry
out actions that are not the advertised use, by making use of the
debug facilities.
Think how many devices using these chips are in devices connected
to the internet anyway and so are capable of downloading new
firmware patches - possibly autonomously.
While direct access to the Bluetooth memory is potentially
troublesome, it
depends whether this interface was ever a security boundary.
Generally these interfaces are not: you're running firmware on the
chip that offers an
API and it's assumed you have full control over it. Because it's
not a security boundary, there's no particular gatekeeping of
access via this API
- the API is just for convenience, and it's often possible to do
the same things via the published API as it is via the unpublished
API. It's only an
API because it's a closed source component and that's the
interface they publish. There was never any protection to stop
you poking things from outside the closed source firmware library.
By analogy, it's like an extra hatch to the ventilation ducts
inside your house that you didn't know about. If you have access
to the ventilation ducts from other places, there's no problem
with having another hatch
- it
doesn't change anything. As we know from Hollywood, it's only if
you decide
to keep hostages in the room with the secret hatch (ie make an
internal security boundary) that the presence of the hatch becomes
important.
In general I would agree, although there is always scope for
mischief when bad actors realise they possibly have access to new capabilities on their collection of already compromised IoT
devices.
"Bad actors" can ruin most forms of entertainment, but they seem to
be blamed for all sorts of things lately. I blame America.
Jeff Layman <Jeff@invalid.invalid> wrote:
On 09/03/2025 21:46, Tim Streater wrote:
For those who program with electronics on IoT (internet of things) devices, >>> the ESP32 has 29 undocumented commands that could be used as a ‘backdoor’.
Below is the article that provides more details.
<https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/>
IMO the takeaway is never to buy anthing from China that has electronice in >>> it.
Chinese chip backdoors have been around for more than a dozen years:
<http://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf>
That chip is by a US manufacturer.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 498 |
Nodes: | 16 (2 / 14) |
Uptime: | 45:56:05 |
Calls: | 9,800 |
Calls today: | 2 |
Files: | 13,752 |
Messages: | 6,189,898 |