this post was submitted on 08 Mar 2025
82 points (95.6% liked)

MICROCONTROLLERS

842 readers
1 users here now

Everything microcontrollers: projects, questions, new releases, etc.

dragontamer's Beginner Guides:

Beginner Series I: What is a Microcontroller?

Beginner Series II: The "Generic" Microcontroller

Beginner Sidenote: Microchip's Signal Chain Design Guide

Beginner Series III: Skills and Complexity Tiers

Beginner Series IV: Deep Dive into Microchip's AVR EA

founded 2 years ago
MODERATORS
all 13 comments
sorted by: hot top controversial new old
[–] Alphane_Moon@lemmy.world 23 points 2 months ago* (last edited 2 months ago)

This seems like a relatively critical issue considering the nature of ESP32.

[–] Alabaster_Mango@lemmy.ca 16 points 2 months ago
[–] RobotToaster@mander.xyz 10 points 2 months ago (1 children)

Can this be used to "jailbreak" proprietary devices that use it?

[–] CameronDev@programming.dev 4 points 2 months ago

It sounds like it'll let you do arbitrary read/writes to memory, so probably yes?

[–] bitfucker@programming.dev 6 points 2 months ago* (last edited 2 months ago)

Edit: so yeah, further reading into this and some video later from LowLevel confirmed that this is quite nothing burger. The "vulnerability" is an undocumented HCI command. Host to Controller Interface. Meaning that it is something the HOST (the ESP) dispatch to the Bluetooth Interface. To take advantage of such a command, you need to already have access to the ESP32 in the first place.

So, the tl;dr is that the "vulnerability" only matters when the attacker has access to the device already. Not really that big of an issue. ~~an attacker can gain access to the ESP32 not the device that connects to the ESP themselves. I don't know how bluetooth pairing would behave when the device that once masquerade as a light switch now advertises themselves as smart watch. I presume it would require further confirmation from the user. If that is the case, then the danger is when ESP32 is used in a device that is already collecting sensitive information with an active bluetooth stack since that device can now be remotely hacked. But I will defer my judgement on this matter after the PoC has been demonstrated (can't find any demo of any proof of concept attack, just the same article copy pasted multiple times on different site)~~

[–] clothes@lemmy.world 3 points 2 months ago (1 children)

Am I correct that this would allow someone to remotely attack everything on my network, even non-ESP devices? So, my ESP lightbulb is putting my PC and phone at risk?

[–] Blue_Morpho@lemmy.world 3 points 2 months ago (1 children)

That's sort of true of all exploits. It needs someone in Bluetooth range to hack the esp32 at which point the esp32 could become a jump point for anything. Mind you any bad app on your phone could also be used to attack your PC. But if something is in Bluetooth range, they could just attempt to attack your phone/PC directly.

[–] clothes@lemmy.world 2 points 2 months ago

Technology is so fun... Thanks for putting this in perspective!