Reports of undocumented Bluetooth HCI commands from ESP32 chips are doing the rounds. They open up a security flaw.
Of course, the core Internet streaming code would be useful with any ESP32, but the display makes for a good-looking unit. The code is available on GitHub. With judicious use of network and audio ...
An undocumented set of low-level commands has been discovered in the ESP32 microchip, a widely used component in IoT devices. Manufactured by the Chinese company Espressif, ...
The ESP32 (Espressif32) is a system-on-chip (SoC) developed by Espressif Systems. It’s the big brother of the ESP8266 ...
Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. ESP32, manufactured by a Chinese company called Espressif, is a ...
A short while ago, a friend gave me an ESP32, the much faster, dual core version of the ESP8266. As I rarely used much of the computing power on the ESP8266, none of the features looked like game ...
The device has a dual-core ESP32 microprocessor with 4MB flash memory, 8MB PSRAM, and 520KB SRAM. It supports Wi-Fi 4, Bluetooth 4.2, and LE and has expandable storage for games via an SD card slot.
Tarlogic found hidden Bluetooth HCI commands in the ESP32 that could comprise its security by allowing read/write to the RAM ...
"In a context where you can compromise an IOT device with as ESP32 you will be able to hide an APT inside the ESP memory and perform Bluetooth (or Wi-Fi) attacks against other devices, while ...
Security company Tarlogic Security has reported that the ESP32 chip used for Wi-Fi and ... HCI commands to read and write controller memory (at issue) are a common design found in Bluetooth ...
Espressif ESP32-C6 RISC-V wireless microcontroller is now PSA Level 2 certified for improved IoT security, and IoT ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results