Security flaw discovered in Bluetooth chip used by a billion devices worldwide

The ESP32 is an extremely popular low-cost chip from Chinese manufacturer Espressif, which is estimated to be used in over 1 billion devices worldwide by 2023, and contains an undocumented "backdoor" that can be exploited for attacks.

These undocumented commands allow for impersonation of trusted devices, unauthorized access to data, redirection to other devices on the network, and the ability to establish persistence.

The discovery was made public by Spanish cybersecurity researchers Miguel Tarascó Acuña and Antonio Vázquez Blanco from the Tarlogic Security team. Speaking at the RootedCON conference in Madrid, they said:

Tarlogic Security has discovered a backdoor in the ESP32, a family of WiFi and Bluetooth-enabled microcontrollers found in millions of IoT devices on the market. Exploiting this backdoor would allow malicious actors to launch spoofing attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks, or medical devices by bypassing code checks.

Security flaw discovered in Bluetooth chip used by a billion devices worldwide Picture 1

 

The ESP32 is one of the most widely used chips in the world for Wi-Fi + Bluetooth connectivity in IoT (Internet of Things) devices, so the risk of any backdoors existing is huge.

Backdoor in ESP32

In a presentation at RootedCON, Tarlogic researchers explained that interest in Bluetooth security research has declined, but not because the protocol or its implementations have become more secure.

Instead, most of the attacks presented last year had no working tools, were incompatible with mainstream hardware, and used outdated or unmaintained tools that are largely incompatible with modern systems.

Tarlogic has developed a new C-based, hardware-independent and cross-platform USB Bluetooth driver that allows direct access to the hardware without relying on operating system specific APIs.

Armed with this new tool, which allows raw access to Bluetooth traffic, Tarlogic discovered hidden vendor-specific commands (Opcode 0x3F) in the ESP32 Bluetooth firmware, allowing low-level control of Bluetooth functions.

Security flaw discovered in Bluetooth chip used by a billion devices worldwide Picture 2

 

In total, they found 29 undocumented commands, collectively described as a 'backdoor,' that can be abused for memory manipulation (read/write RAM and Flash), MAC address spoofing (device spoofing), and LMP/LLCP packet injection. The issue is currently tracked under the identifier CVE-2025-27840.

Security flaw discovered in Bluetooth chip used by a billion devices worldwide Picture 3

Potential risks

Risks arising from these commands include malicious deployment at the OEM level and supply chain attacks.

Depending on how the Bluetooth stack handles HCI commands on the device, remote backdoor exploitation may be possible via malicious firmware or a spoofed Bluetooth connection.

This is especially true if the attacker already has root access, installs malware, or pushes a malicious update to the device, opening up low-level access.

However, in general, having physical access to a device's USB or UART interface is much more dangerous and a more realistic attack scenario.

" In a scenario where you can compromise an IoT device running an ESP32 chip, you would be able to hide an APT (Advanced Persistent Threat) in the ESP memory and perform Bluetooth (or Wi-Fi) attacks against other devices, while also controlling the device over Wi-Fi/Bluetooth ," the team explains. " Our discovery would allow full control of the ESP32 chip and maintain persistence in the chip through commands that allow modification of RAM and Flash. Additionally, with persistence in the chip, it would be possible to spread to other devices because ESP32 allows for advanced Bluetooth attacks . "

TipsMake.com will continue to update information on this issue, please pay attention.

4 ★ | 1 Vote

May be interested

  • How secure is Bluetooth?How secure is Bluetooth?
    if you regularly watch the news of network security over the past year, you'll encounter some attacks via bluetooth. for example, the blueborne vulnerability is scary for smartphones using bluetooth to connect external devices. this question raises the question: how secure is bluetooth?
  • How to secure Bluetooth devicesHow to secure Bluetooth devices
    with the ability to connect to other devices such as a wireless network within a distance of 9m, bluetooth is an integrated technology in a variety of devices from mobile phones, personal pda assist devices and computers. portable to vehicles & o
  • Warning: Huawei's 4G USB contains a serious security flawWarning: Huawei's 4G USB contains a serious security flaw
    last week, trustwave security researchers discovered a serious security flaw in huawei's 4g usb products. usb 4g is a device used to provide an internet connection to a laptop or desktop computer via a usb port.
  • The difference between H1 chip and Apple W1 chipThe difference between H1 chip and Apple W1 chip
    like w1 in the original airpods, the second-generation h1 in airpods handles quick pairing with apple devices, maintaining bluetooth connectivity and more.
  • Thousands of servers are affected by the flaw on SaltStack RCEThousands of servers are affected by the flaw on SaltStack RCE
    vietnam cyber ​​security joint stock company (vsec) has just warned of the saltstack rce security error - a serious flaw discovered on saltstack that could seriously affect the entire information technology system of the enterprise. .
  • These critical Bluetooth vulnerabilities allow hackers to impersonate legitimate devicesThese critical Bluetooth vulnerabilities allow hackers to impersonate legitimate devices
    attackers can abuse vulnerabilities discovered in the bluetooth core and mesh profile specification to impersonate legitimate devices during pairing and launch man-in-the- middle (mitm).
  • How to find lost Bluetooth devicesHow to find lost Bluetooth devices
    bluetooth devices with more and more compact designs mean they are also easier to lose
  • How to set up and manage Bluetooth devices in WindowsHow to set up and manage Bluetooth devices in Windows
    many pc users have switched to bluetooth mice and keyboards, not to mention wireless bluetooth headsets. luckily, windows supports the latest bluetooth 5.4 technology, making it easier than ever to enable bluetooth in windows.
  • Sim vulnerabilities threaten more than 1 billion phones globallySim vulnerabilities threaten more than 1 billion phones globally
    recently, researchers at adaptivemobile security, based in dublin (usa), have discovered a security vulnerability called simjacker that could use users' own sim phones to track them. .
  • How does the security chip on smartphones work?How does the security chip on smartphones work?
    on each smartphone, there is a security chip that protects the user's device. for example, google's pixel 3 is a titan m chip, on apple's iphone is secure enclave, and samsung's galaxy smartphone and some android devices are arm's trustzone technology.