Critical and high-severity bugs | xxxCritical and high-severity bugs – xxx
菜单

Critical and high-severity bugs

八月 5, 2019 - BleepingComputer

Critical and high-severity bugs

Two serious vulnerabilities in Qualcomm’s Snapdragon system-on-a-chip (SoC) WLAN firmware could be leveraged to compromise the modem and the Android kernel over the air.

The flaws were found in Qualcomm’s Snapdragon 835 and 845 WLAN component. The tests were made on Google Pixel 2 and 3 but any unpatched phone running one of the two SoCs is vulnerable.

Critical and high-severity bugs

Security researchers from Tencent’s Blade team found that one one of the vulnerabilities (CVE-2019-10538, with a high severity rating)  allows attackers to compromise the WLAN and the chip’s modem over-the-air.

The second one is a buffer overflow tracked as CVE-2019-10540; it received a critical severity rating and an attacker can exploit it to compromise the Android Kernel from the WLAN component.

The researchers informed both Google and Qualcomm about the flaws and exploitation is currently possible only on Android phones that have not been patched with the latest security updates that rolled out today.

Qualcomm on June 3 published a security bulletin to original equipment manufacturers (OEMs) to allow them to prepare the Android update for their devices.

The chip maker advises “end users to update their devices as patches become available from OEMs.”

Despite patches being available, a high number of phones is likely to remain vulnerable for a long time as the devices may no longer be eligible for updates from the vendor.

Also, not all makers are ready to push the Android update when Google releases it. It is common to see security updates for phones still supported by their maker reach devices with weeks of delay.

Full disclosure ahead

Tencent’s Blade researchers are scheduled to present the technical details for the QualPwn bugs and exploiting them on Thursday, at the Black Hat security conference. They have already published a brief advisory about the two vulnerabilities.

“On the Qualcomm platform, subsystems are protected by the Secure Boot and unable to be touched externally. We’ll introduce the vulnerability we found in Modem to defeat the Secure Boot and elevate privilege into Modem locally so that we can setup the live debugger for baseband.”

With the debugger, they could learn the system architecture, the components and how the code and the data flow work. This also allowed them to determine the attack surface of the WLAN firmware.

The Black Hat presentation will include details about exploiting the WLAN firmware layer, its integration in the modem as an isolated user-space application constraint, and reaching the modem.

Related Articles:

New Android Ransomware Uses SMS Spam to Infect Its Victims

Stalkerware Apps on Google Play Installed Over 130,000 Times

Unofficial Telegram App with 100K Installs Pushed Malicious Sites

Samsung Update App with 10M+ Installs Charges for Free Firmware

BianLian Android Banking Trojan Upgraded With Screen Recorder

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51