Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-27840
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-08 Mar, 2025 | 00:00
Updated At-12 May, 2025 | 15:33
Rejected At-
▼CVE Numbering Authority (CNA)

Espressif ESP32 chips allow 29 hidden HCI commands, such as 0xFC02 (Write memory).

Affected Products
Vendor
Espressif
Product
ESP32
Default Status
unknown
Versions
Affected
  • 2025-03-06 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-912CWE-912 Hidden Functionality
Type: CWE
CWE ID: CWE-912
Description: CWE-912 Hidden Functionality
Metrics
VersionBase scoreBase severityVector
3.16.8MEDIUM
CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
Version: 3.1
Base score: 6.8
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/TarlogicSecurity/Talks/blob/main/2025_RootedCon_BluetoothTools.pdf
N/A
https://x.com/pascal_gujer/status/1898442439704158276
N/A
https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
N/A
https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/
N/A
https://reg.rootedcon.com/cfp/schedule/talk/5
N/A
https://flyingpenguin.com/?p=67838
N/A
https://github.com/em0gi/CVE-2025-27840
N/A
https://github.com/orgs/espruino/discussions/7699
N/A
https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/
N/A
https://darkmentor.com/blog/esp32_non-backdoor/
N/A
https://news.ycombinator.com/item?id=43308740
N/A
https://news.ycombinator.com/item?id=43301369
N/A
https://github.com/esphome/esphome/discussions/8382
N/A
https://cheriot.org/auditing/backdoor/2025/03/09/no-esp32-style-backdoor.html
N/A
https://www.espressif.com/en/news/Response_ESP32_Bluetooth
N/A
Hyperlink: https://github.com/TarlogicSecurity/Talks/blob/main/2025_RootedCon_BluetoothTools.pdf
Resource: N/A
Hyperlink: https://x.com/pascal_gujer/status/1898442439704158276
Resource: N/A
Hyperlink: https://www.tarlogic.com/news/backdoor-esp32-chip-infect-ot-devices/
Resource: N/A
Hyperlink: https://www.bleepingcomputer.com/news/security/undocumented-backdoor-found-in-bluetooth-chip-used-by-a-billion-devices/
Resource: N/A
Hyperlink: https://reg.rootedcon.com/cfp/schedule/talk/5
Resource: N/A
Hyperlink: https://flyingpenguin.com/?p=67838
Resource: N/A
Hyperlink: https://github.com/em0gi/CVE-2025-27840
Resource: N/A
Hyperlink: https://github.com/orgs/espruino/discussions/7699
Resource: N/A
Hyperlink: https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/
Resource: N/A
Hyperlink: https://darkmentor.com/blog/esp32_non-backdoor/
Resource: N/A
Hyperlink: https://news.ycombinator.com/item?id=43308740
Resource: N/A
Hyperlink: https://news.ycombinator.com/item?id=43301369
Resource: N/A
Hyperlink: https://github.com/esphome/esphome/discussions/8382
Resource: N/A
Hyperlink: https://cheriot.org/auditing/backdoor/2025/03/09/no-esp32-style-backdoor.html
Resource: N/A
Hyperlink: https://www.espressif.com/en/news/Response_ESP32_Bluetooth
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found