{"id":351,"date":"2025-03-10T16:38:05","date_gmt":"2025-03-10T16:38:05","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4296636"},"modified":"2025-03-10T16:38:05","modified_gmt":"2025-03-10T16:38:05","slug":"billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/","title":{"rendered":"Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands"},"content":{"rendered":"<figure id=\"attachment_4296637\" aria-describedby=\"caption-attachment-4296637\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4296637\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk.jpg\" alt=\"Tarlogic team giving their presentation during RootedCON.\" width=\"1400\" height=\"900\" srcset=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk.jpg 1400w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-300x193.jpg 300w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-1024x658.jpg 1024w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-768x494.jpg 768w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-50x32.jpg 50w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-770x495.jpg 770w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-370x238.jpg 370w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-270x174.jpg 270w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-740x476.jpg 740w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-540x347.jpg 540w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-1110x714.jpg 1110w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/tr_20250311-esp32-hidden-commands-hacking-risk-810x521.jpg 810w\" sizes=\"auto, (max-width: 1400px) 100vw, 1400px\"><figcaption id=\"caption-attachment-4296637\" class=\"wp-caption-text\">Tarlogic team giving their presentation during RootedCON. Image: Tarlogic<\/figcaption><\/figure>\n<p>Billions of devices worldwide rely on a widely used Bluetooth-Wi-Fi chip that contains undocumented \u201chidden commands.\u201d Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls.<\/p>\n<p>ESP32, manufactured by a Chinese company called Espressif, is a microcontroller that enables Bluetooth and Wi-Fi connections in numerous smart devices, including smartphones, laptops, smart locks, and medical equipment. Its popularity is partly due to its low cost, with units available for just a few dollars.<\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<h2><span class=\"ez-toc-section\" id=\"Hidden_Bluetooth_commands_and_potential_exploits\"><\/span>Hidden Bluetooth commands and potential exploits<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Researchers at security firm Tarlogic discovered 29 undocumented Host Controller Interface commands within the ESP32\u2019s Bluetooth firmware. These commands enable low-level control over some Bluetooth functions, such as reading and writing memory, modifying MAC addresses, and injecting malicious packets, according to Bleeping Computer, which attended Tarlogic\u2019s presentation at RootedCON.<\/p>\n<p><strong>SEE: <a href=\"https:\/\/www.techrepublic.com\/article\/zscaler-2024-mobile-iot-ot-cyber-threat-report\/\">Zscaler Report: Mobile, IoT, and OT Cyber Threats Surged in 2024<\/a><\/strong><\/p>\n<p>While these functions aren\u2019t inherently malicious, bad actors could exploit them to stage impersonation attacks, introduce and hide backdoors, or modify device behavior \u2014 all while bypassing code audit controls. Such incidents could lead to a supply chain attack targeting other smart devices.<\/p>\n<p>\u201cMalicious actors could impersonate known devices to connect to mobile phones, computers and smart devices, even if they are in offline mode,\u201d the Tarlogic researchers wrote in a <a href=\"https:\/\/www.tarlogic.com\/news\/backdoor-esp32-chip-infect-ot-devices\/\" target=\"_blank\" rel=\"noopener\">blog post<\/a>. \u201cFor what purpose? To obtain confidential information stored on them, to have access to personal and business conversations, and to spy on citizens and companies.\u201d<\/p>\n<h3>What are the barriers to entry for these exploits?<\/h3>\n<p>Despite the risks, there are barriers to entry for exploiting these commands, which distinguishes them from typical backdoor vulnerabilities. Attackers would need physical access to the smart device\u2019s USB or UART interface, or they would need to have already compromised the firmware through stolen root access, pre-installed malware, or other vulnerabilities to exploit the commands remotely.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_happens_next\"><\/span>What happens next?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Tarlogic researchers Miguel Tarasc\u00f3 Acu\u00f1a and Antonio V\u00e1zquez Blanco discovered the vulnerable HCI commands using BluetoothUSB, a free hardware-independent, cross-platform tool that enables access to Bluetooth traffic for security audits and testing.<\/p>\n<p>These hidden commands are likely hardware-debugging Opcode instructions that were unintentionally left exposed; TechRepublic has contacted Espressif to confirm but the company has yet to respond as of writing. The company\u2019s response will be crucial in determining whether firmware updates or mitigations will be released to secure affected devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tarlogic team giving their presentation during RootedCON. Image: Tarlogic Billions of devices worldwide rely on a widely used Bluetooth-Wi-Fi chip that contains undocumented \u201chidden commands.\u201d Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. ESP32, manufactured by a Chinese company called Espressif, is a microcontroller that enables Bluetooth [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":352,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-351","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"Tarlogic team giving their presentation during RootedCON. Image: Tarlogic Billions of devices worldwide rely on a widely used Bluetooth-Wi-Fi chip that contains undocumented \u201chidden commands.\u201d Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. ESP32, manufactured by a Chinese company called Espressif, is a microcontroller that enables Bluetooth [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-10T16:38:05+00:00\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/\",\"name\":\"Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands.jpg\",\"datePublished\":\"2025-03-10T16:38:05+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands.jpg\",\"width\":1400,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/","og_locale":"en_US","og_type":"article","og_title":"Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands - TecnoArtesanos Tech Blog","og_description":"Tarlogic team giving their presentation during RootedCON. Image: Tarlogic Billions of devices worldwide rely on a widely used Bluetooth-Wi-Fi chip that contains undocumented \u201chidden commands.\u201d Researchers warn these commands could be exploited to manipulate memory, impersonate devices, and bypass security controls. ESP32, manufactured by a Chinese company called Espressif, is a microcontroller that enables Bluetooth [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-03-10T16:38:05+00:00","author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/","name":"Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands.jpg","datePublished":"2025-03-10T16:38:05+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands.jpg","width":1400,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/10\/billions-of-devices-at-risk-of-hacking-impersonation-due-to-hidden-commands\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"Billions of Devices at Risk of Hacking &amp; Impersonation Due to Hidden Commands"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/351\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/352"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}