I’m still looking into this but, “backdoor” appears to be incorrect and sensationalist. A team used proprietary software to uncover undocumented opcodes related to the Host Controller Interface (HCI). This could provide a path for arbitrary code execution, if one already has control of the Host… In which case they can arbitrarily execute whatever code they want.
I’m still looking into this but, “backdoor” appears to be incorrect and sensationalist. A team used proprietary software to uncover undocumented opcodes related to the Host Controller Interface (HCI). This could provide a path for arbitrary code execution, if one already has control of the Host… In which case they can arbitrarily execute whatever code they want.