Source Link Privacy.

Privacy test result

https://themarkup.org/blacklight?url=https%3A%2F%2Fwww.tarlogic.com%2Fnews%2Fbackdoor-esp32-chip-infect-ot-devices%2F&device=mobile&location=us-ca&force=false

Tarlogic Security has detected a backdoor in the ESP32, a microcontroller that enables WiFi and Bluetooth connection and is present in millions of mass-market IoT devices. Exploitation of this backdoor would allow hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls.

Update: The ESP32 “backdoor” that wasn’t.

  • @RememberTheApollo_
    link
    English
    8
    edit-2
    19 hours ago

    Yeah, I caught the ESP32 part and tried to search for what devices these chips were built into, but couldn’t find one. I was curious how widespread the flaw was - as in, what consumer or infrastructure devices they might be in.

      • @RememberTheApollo_
        link
        English
        218 hours ago

        Thanks, that’s a pretty short list - as you said it’s limited.

        • walden
          link
          fedilink
          English
          29 hours ago

          The homepage just has recently added devices. Use the menu to browse by device type.

          • @RememberTheApollo_
            link
            English
            2
            edit-2
            9 hours ago

            Wow. Ok, some more brand name devices are starting to be named. Still mostly consumer IOT like bulbs and smart plugs. Thanks for the update. I can see one device we own.

    • @[email protected]
      link
      fedilink
      English
      216 hours ago

      Oh those kind of devices. Its very popular for hobbyists and self-designed devices or cheap IoT products. Don’t know the market presence outside Asia but its quite popular in India due to its low cost.