【18+ Archives】
A potential security issue has been discovered by cybersecurity researchers that has the capability to affect more than one billion devices.
According to researchers at the cybersecurity firm Tarlogic8+ Archives a hidden command has been foundcoded into a bluetooth chip installed in devices around the world. This secret functionality can be weaponized by bad actors and, according to the researchers, used as an exploit into these devices.
Using these commands, hackers could impersonate a trusted device and then connect to smartphones, computers, and other devices in order to access information stored on them. Bad actors can continue to utilize their connection to the device to essentially spy on users.
You May Also Like
The bluetooth chip is called ESP32 and is manufactured by the China-based company Espressif. According to researchers, the ESP32 is "a microcontroller that enables WiFi and Bluetooth connection." In 2023, Espressif reported that one billion units of its ESP32 chip had been sold globally. Millions of IoT devices like smart appliances utilize this particular ESP32 chip.
Tarlogic researchers say that this hidden command could be exploited, which would allow "hostile actors to conduct impersonation attacks and permanently infect sensitive devices such as mobile phones, computers, smart locks or medical equipment by bypassing code audit controls." Tarlogic says that these commands are not publicly documented by Espressif.
Researchers with Tarlogic developed a new Bluetooth driver tool in order to aid in Bluetooth-related security research, which enabled the security firm to discover a total of 29 hidden functionalities that could be exploited to impersonate known devices and access confidential information stored on a device.
According to Tarlogic, Espressif sells these bluetooth chips for roughly $2, which explains why so many devices utilize the component over higher costing options.
As BleepingComputerreports, the issue is being tracked as CVE-2025-27840.
Topics Bluetooth Cybersecurity
Search
Categories
Latest Posts
Parental Controls: How to Lock Down Your Kids' iOS Devices
2025-06-26 22:11Diary, 2010 by Adam Levin
2025-06-26 20:47Wolf Moon by Nina MacLaughlin
2025-06-26 20:44Walk Worthy by Eloghosa Osunde
2025-06-26 20:04Popular Posts
Best vacuum mop combo deal: Save $140 on the Tineco Floor One S5
2025-06-26 21:59Megha Majumdar, Fiction by Megha Majumdar
2025-06-26 20:03Diary, 2010 by Adam Levin
2025-06-26 20:02Crush by Kathryn Davis
2025-06-26 19:54Draper vs. Arnaldi 2025 livestream: Watch Madrid Open for free
2025-06-26 19:43Featured Posts
Chetna Maroo Wins This Year’s Plimpton Prize by The Paris Review
2025-06-26 20:46David Wojnarowicz’s Home in the City by Hannah Gold
2025-06-26 20:13Vesna by The Paris Review
2025-06-26 19:55Study trains Port Jackson sharks to respond to jazz music
2025-06-26 19:44Popular Articles
How to Reboot and Reset Android Devices
2025-06-26 21:42Nana Nkweti, Fiction by Nana Nkweti
2025-06-26 20:29Redux: Naked Lightbulb by The Paris Review
2025-06-26 20:24Two Poems by Kathleen Ossip
2025-06-26 20:14Then and Now: Almost 10 Years of Intel CPUs Compared
2025-06-26 20:05Newsletter
Subscribe to our newsletter for the latest updates.
Comments (425)
Prosperous Times Information Network
The Best Gaming Concept Art of 2016
2025-06-26 21:13Exquisite Information Network
Redux: Of Continuous Change by The Paris Review
2025-06-26 20:46Information Information Network
Jesse McCarthy, Nonfiction by Jesse McCarthy
2025-06-26 19:59Pioneer Information Network
Chestnut Trees by Hermann Hesse
2025-06-26 19:54Habit Information Network
What's Thermal Throttling and How to Prevent It
2025-06-26 19:46