-
Notifications
You must be signed in to change notification settings - Fork 36
Description
Need to audit the ways in which WiFi passwords are passed around memory and what level of protection we can provide.
At the moment, WiFi passwords are held in volatile arrays. Conceivably these can be leaked over the PSRAM interface at startup. This could be particularly problematic when the product reaches end of life and is discarded. A militous actor could gain physical access and the expose the WiFi passwords by monitoring the PSRAM interface.
One possible "easy" mitigation is to ensure that passwords are only ever stored in encrypted FLASH or internal SRAM. It is not impossible that a hacker could exploit a bug to inject code which can still expose the password from internal SRAM, but at least preventing it from being exposed over the PSRAM interface raises the barrier for a hacker considerably.