The ESP32 microcontroller, a cornerstone in countless IoT devices and embedded systems, harbors a ticking time bomb within its hardware Random Number Generator (RNG). When operating without Wi-Fi or Bluetooth connectivity, the ESP32’s RNG fails to produce true randomness, leading to dangerously predictable cryptographic operations. This talk rips the veil off this critical vulnerability, diving deep into the technical underpinnings and demonstrating how attackers can exploit these weaknesses to recover cryptographic keys, predict security tokens, and compromise secure boot processes.
By dissecting popular open-source projects like ESPHome, Tasmota, and MicroPython, we expose how widespread this issue is and how it can be weaponized in real-world scenarios. Live demonstrations will showcase the ease with which secure systems can be breached, emphasizing the urgent need for awareness and remediation. Attendees will walk away equipped with the knowledge to assess their own systems for these vulnerabilities and implement actionable strategies to safeguard against such attacks.