1025
Undocumented Commands Found In Bluetooth Chip Manufactured in China Used By a Billion Devices.
(www.tarlogic.com)
This is a most excellent place for technology news and articles.
Wrong. Read the analysis. It is a BT vulnerability. One can probably design a cheap attack system that just sends a erase flash command to any BT device in reach, instantly bricking every BT enabled ESP32 device.
Just reread it and no, it's not a BT vulnerability. The "erase flash" command is something that has to be done by software running outside the BT stack. You can even see that inside the slides. The
UsbBluetooth
software is connected to the device with the flawed bluetooth chipset.The vulnerability is that if you have this chipset and compromised software, someone can flash the chipset with compromised flash. They even say that it's not an easy attack to pull off in the article.
In otherwords, the attack is something that can only be pulled off if there's also a security vulnerability within other parts of the hardware stack.
Yeah, that's not the main concern.