<p>➀ A hidden feature in the widely-used ESP32 microcontroller allows attackers to spoof devices, steal data, and install malware, posing risks to millions of IoT devices.</p><p>➁ The vulnerability stems from hidden commands in the Bluetooth Host Controller Interface (HCI), which are typically used for debugging but can be exploited for malicious purposes.</p><p>➂ Espressif, the manufacturer of ESP32, acknowledges the issue but claims these commands are for internal testing. Users are advised to conduct security audits and follow best practices to mitigate risks.</p>
Related Articles
- Security Bug in ESP Chips! What is it? How to Handle it?5 months ago
- Compact Wireless SoC With Memory And Power4 months ago
- Embedded World: Crypto Quantique demo-es software PQC system5 months ago
- Embedded World 2025: Get the full Electronics Weekly Guide5 months ago
- Crypto Quantique upgrades Quarklink IOT for PQC8 months ago
- Crypto-Quantique adds OTP capability10 months ago
- Crypto Quantique hooks up with Adlink11 months ago
- Heads-Up Apple Users, Cthulhu Stealer Malware For macOS Is Targeting You12 months ago
- Should You Click 'Unsubscribe' On Unwanted Emails? Security Experts Weigh In2 months ago
- Crypto Quantique launches lightweight RoT IP block4 months ago