-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CVE Vulnerability Details :
CVE-2025-27840
PUBLISHED
More Info
Official Page
Assigner
-
mitre
Assigner Org ID
-
8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At
-
08 Mar, 2025 | 00:00
Updated At
-
12 May, 2025 | 15:33
Rejected At
-
▼
CVE Numbering Authority (CNA)
Espressif ESP32 chips allow 29 hidden HCI commands, such as 0xFC02 (Write memory).
Affected Products
Vendor
Espressif
Product
ESP32
Default Status
unknown
Versions
Affected
2025-03-06
(custom)
Problem Types
Type
CWE ID
Description
CWE
CWE-912
CWE-912 Hidden Functionality
Type:
CWE
CWE ID:
CWE-912
Description:
CWE-912 Hidden Functionality
Metrics
Version
Base score
Base severity
Vector
3.1
6.8
MEDIUM
CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
Version:
3.1
Base score:
6.8
Base severity:
MEDIUM
Vector:
CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://github.com/TarlogicSecurity/Talks/blob/main/2025_RootedCon_BluetoothTools.pdf
N/A
https://x.com/pascal_gujer/status/1898442439704158276
N/A
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
N/A
https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/
N/A
https://reg.rootedcon.com/cfp/schedule/talk/5
N/A
https://flyingpenguin.com/?p=67838
N/A
https://github.com/em0gi/CVE-2025-27840
N/A
https://github.com/orgs/espruino/discussions/7699
N/A
https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/
N/A
https://darkmentor.com/blog/esp32_non-backdoor/
N/A
https://news.ycombinator.com/item?id=43308740
N/A
https://news.ycombinator.com/item?id=43301369
N/A
https://github.com/esphome/esphome/discussions/8382
N/A
https://cheriot.org/auditing/backdoor/2025/03/09/no-esp32-style-backdoor.html
N/A
https://www.espressif.com/en/news/Response_ESP32_Bluetooth
N/A
Hyperlink:
https://github.com/TarlogicSecurity/Talks/blob/main/2025_RootedCon_BluetoothTools.pdf
Resource:
N/A
Hyperlink:
https://x.com/pascal_gujer/status/1898442439704158276
Resource:
N/A
Hyperlink:
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
Resource:
N/A
Hyperlink:
https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/
Resource:
N/A
Hyperlink:
https://reg.rootedcon.com/cfp/schedule/talk/5
Resource:
N/A
Hyperlink:
https://flyingpenguin.com/?p=67838
Resource:
N/A
Hyperlink:
https://github.com/em0gi/CVE-2025-27840
Resource:
N/A
Hyperlink:
https://github.com/orgs/espruino/discussions/7699
Resource:
N/A
Hyperlink:
https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/
Resource:
N/A
Hyperlink:
https://darkmentor.com/blog/esp32_non-backdoor/
Resource:
N/A
Hyperlink:
https://news.ycombinator.com/item?id=43308740
Resource:
N/A
Hyperlink:
https://news.ycombinator.com/item?id=43301369
Resource:
N/A
Hyperlink:
https://github.com/esphome/esphome/discussions/8382
Resource:
N/A
Hyperlink:
https://cheriot.org/auditing/backdoor/2025/03/09/no-esp32-style-backdoor.html
Resource:
N/A
Hyperlink:
https://www.espressif.com/en/news/Response_ESP32_Bluetooth
Resource:
N/A
▼
Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
Details not found