Project Zero

Syndikovat obsah
News and updates from the Project Zero team at Google
Aktualizace: 50 min 10 sek zpět

Multiple Internet to Baseband Remote Code Execution Vulnerabilities in Exynos Modems

16 Březen, 2023 - 20:07
.lst-kix_iavizzpdbbty-5>li{counter-increment:lst-ctn-kix_iavizzpdbbty-5}ol.lst-kix_iavizzpdbbty-0{list-style-type:none}ol.lst-kix_iavizzpdbbty-4.start{counter-reset:lst-ctn-kix_iavizzpdbbty-4 0}ol.lst-kix_iavizzpdbbty-2{list-style-type:none}ol.lst-kix_iavizzpdbbty-1{list-style-type:none}ol.lst-kix_iavizzpdbbty-0.start{counter-reset:lst-ctn-kix_iavizzpdbbty-0 0}.lst-kix_pidqkndckybh-1>li:before{content:"\0025cb "}.lst-kix_pidqkndckybh-2>li:before{content:"\0025a0 "}ol.lst-kix_iavizzpdbbty-7.start{counter-reset:lst-ctn-kix_iavizzpdbbty-7 0}.lst-kix_tkumn87s07hu-6>li:before{content:"\0025cf "}.lst-kix_pidqkndckybh-0>li:before{content:"\0025cf "}.lst-kix_tkumn87s07hu-5>li:before{content:"\0025a0 "}.lst-kix_tkumn87s07hu-4>li:before{content:"\0025cb "}.lst-kix_tkumn87s07hu-3>li:before{content:"\0025cf "}ul.lst-kix_pidqkndckybh-8{list-style-type:none}.lst-kix_tkumn87s07hu-0>li:before{content:"\0025cf "}ul.lst-kix_tkumn87s07hu-0{list-style-type:none}ul.lst-kix_pidqkndckybh-7{list-style-type:none}ul.lst-kix_tkumn87s07hu-1{list-style-type:none}.lst-kix_iavizzpdbbty-6>li{counter-increment:lst-ctn-kix_iavizzpdbbty-6}ul.lst-kix_pidqkndckybh-6{list-style-type:none}ul.lst-kix_tkumn87s07hu-2{list-style-type:none}ul.lst-kix_pidqkndckybh-5{list-style-type:none}ul.lst-kix_tkumn87s07hu-3{list-style-type:none}.lst-kix_tkumn87s07hu-2>li:before{content:"\0025a0 "}ul.lst-kix_tkumn87s07hu-4{list-style-type:none}.lst-kix_pidqkndckybh-8>li:before{content:"\0025a0 "}ul.lst-kix_tkumn87s07hu-5{list-style-type:none}.lst-kix_tkumn87s07hu-1>li:before{content:"\0025cb "}ul.lst-kix_tkumn87s07hu-6{list-style-type:none}ul.lst-kix_tkumn87s07hu-7{list-style-type:none}ol.lst-kix_iavizzpdbbty-5.start{counter-reset:lst-ctn-kix_iavizzpdbbty-5 0}ol.lst-kix_iavizzpdbbty-8.start{counter-reset:lst-ctn-kix_iavizzpdbbty-8 0}.lst-kix_pidqkndckybh-3>li:before{content:"\0025cf "}ol.lst-kix_iavizzpdbbty-4{list-style-type:none}.lst-kix_iavizzpdbbty-1>li{counter-increment:lst-ctn-kix_iavizzpdbbty-1}ol.lst-kix_iavizzpdbbty-3{list-style-type:none}.lst-kix_iavizzpdbbty-4>li{counter-increment:lst-ctn-kix_iavizzpdbbty-4}ol.lst-kix_iavizzpdbbty-6{list-style-type:none}ol.lst-kix_iavizzpdbbty-5{list-style-type:none}ol.lst-kix_iavizzpdbbty-8{list-style-type:none}ol.lst-kix_iavizzpdbbty-1.start{counter-reset:lst-ctn-kix_iavizzpdbbty-1 0}ol.lst-kix_iavizzpdbbty-7{list-style-type:none}.lst-kix_pidqkndckybh-4>li:before{content:"\0025cb "}ul.lst-kix_tkumn87s07hu-8{list-style-type:none}.lst-kix_pidqkndckybh-5>li:before{content:"\0025a0 "}.lst-kix_pidqkndckybh-6>li:before{content:"\0025cf "}.lst-kix_sqy4x6nn8j70-7>li:before{content:"\0025cb "}.lst-kix_pidqkndckybh-7>li:before{content:"\0025cb "}.lst-kix_sqy4x6nn8j70-8>li:before{content:"\0025a0 "}.lst-kix_iavizzpdbbty-7>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-7,lower-latin) ". "}.lst-kix_iavizzpdbbty-6>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-6,decimal) ". "}.lst-kix_iavizzpdbbty-8>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-8,lower-roman) ". "}.lst-kix_sqy4x6nn8j70-3>li:before{content:"\0025cf "}ul.lst-kix_sqy4x6nn8j70-8{list-style-type:none}ul.lst-kix_sqy4x6nn8j70-7{list-style-type:none}.lst-kix_sqy4x6nn8j70-2>li:before{content:"\0025a0 "}.lst-kix_sqy4x6nn8j70-6>li:before{content:"\0025cf "}ul.lst-kix_sqy4x6nn8j70-4{list-style-type:none}ul.lst-kix_sqy4x6nn8j70-3{list-style-type:none}.lst-kix_iavizzpdbbty-2>li{counter-increment:lst-ctn-kix_iavizzpdbbty-2}.lst-kix_iavizzpdbbty-4>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-4,lower-latin) ". "}ul.lst-kix_sqy4x6nn8j70-6{list-style-type:none}.lst-kix_sqy4x6nn8j70-5>li:before{content:"\0025a0 "}ul.lst-kix_sqy4x6nn8j70-5{list-style-type:none}.lst-kix_iavizzpdbbty-5>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-5,lower-roman) ". "}.lst-kix_iavizzpdbbty-7>li{counter-increment:lst-ctn-kix_iavizzpdbbty-7}ul.lst-kix_sqy4x6nn8j70-0{list-style-type:none}ul.lst-kix_sqy4x6nn8j70-2{list-style-type:none}ul.lst-kix_sqy4x6nn8j70-1{list-style-type:none}.lst-kix_sqy4x6nn8j70-4>li:before{content:"\0025cb "}.lst-kix_iavizzpdbbty-0>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-0,decimal) ". "}.lst-kix_iavizzpdbbty-3>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-3,decimal) ". "}ul.lst-kix_pidqkndckybh-0{list-style-type:none}.lst-kix_iavizzpdbbty-2>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-2,lower-roman) ". "}.lst-kix_iavizzpdbbty-1>li:before{content:"" counter(lst-ctn-kix_iavizzpdbbty-1,lower-latin) ". "}.lst-kix_iavizzpdbbty-3>li{counter-increment:lst-ctn-kix_iavizzpdbbty-3}.lst-kix_sqy4x6nn8j70-1>li:before{content:"\0025cb "}ul.lst-kix_pidqkndckybh-4{list-style-type:none}ul.lst-kix_pidqkndckybh-3{list-style-type:none}ol.lst-kix_iavizzpdbbty-2.start{counter-reset:lst-ctn-kix_iavizzpdbbty-2 0}.lst-kix_sqy4x6nn8j70-0>li:before{content:"\0025cf "}ul.lst-kix_pidqkndckybh-2{list-style-type:none}ul.lst-kix_pidqkndckybh-1{list-style-type:none}.lst-kix_iavizzpdbbty-0>li{counter-increment:lst-ctn-kix_iavizzpdbbty-0}ol.lst-kix_iavizzpdbbty-3.start{counter-reset:lst-ctn-kix_iavizzpdbbty-3 0}li.li-bullet-0:before{margin-left:-18pt;white-space:nowrap;display:inline-block;min-width:18pt}.lst-kix_tkumn87s07hu-7>li:before{content:"\0025cb "}.lst-kix_tkumn87s07hu-8>li:before{content:"\0025a0 "}ol.lst-kix_iavizzpdbbty-6.start{counter-reset:lst-ctn-kix_iavizzpdbbty-6 0}.lst-kix_iavizzpdbbty-8>li{counter-increment:lst-ctn-kix_iavizzpdbbty-8}ol{margin:0;padding:0}table td,table th{padding:0}.nAjVSlbajO-c2{margin-left:36pt;padding-top:0pt;padding-left:0pt;padding-bottom:0pt;line-height:1.5;orphans:2;widows:2;text-align:left}.nAjVSlbajO-c3{color:#000000;font-weight:400;text-decoration:none;vertical-align:baseline;font-size:11pt;font-family:"Arial";font-style:normal}.nAjVSlbajO-c1{padding-top:0pt;padding-bottom:0pt;line-height:1.5;orphans:2;widows:2;text-align:left;height:11pt}.nAjVSlbajO-c18{padding-top:20pt;padding-bottom:6pt;line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}.nAjVSlbajO-c10{padding-top:18pt;padding-bottom:6pt;line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}.nAjVSlbajO-c16{color:#000000;font-weight:400;text-decoration:none;vertical-align:baseline;font-size:16pt;font-family:"Arial";font-style:normal}.nAjVSlbajO-c6{padding-top:0pt;padding-bottom:0pt;line-height:1.5;orphans:2;widows:2;text-align:left}.nAjVSlbajO-c7{color:#000000;font-weight:400;vertical-align:baseline;font-size:11pt;font-family:"Arial";font-style:normal}.nAjVSlbajO-c5{color:#000000;font-weight:400;vertical-align:baseline;font-size:20pt;font-family:"Arial";font-style:normal}.nAjVSlbajO-c4{color:#000000;font-weight:700;vertical-align:baseline;font-size:11pt;font-family:"Arial";font-style:italic}.nAjVSlbajO-c20{color:#000000;font-weight:400;vertical-align:baseline;font-size:16pt;font-family:"Arial";font-style:normal}.nAjVSlbajO-c15{color:#000000;font-weight:400;vertical-align:baseline;font-size:11pt;font-family:"Arial"}.nAjVSlbajO-c11{padding-top:0pt;padding-bottom:0pt;line-height:1.5;text-align:left}.nAjVSlbajO-c8{text-decoration-skip-ink:none;-webkit-text-decoration-skip:none;color:#1155cc;text-decoration:underline}.nAjVSlbajO-c12{text-decoration-skip-ink:none;-webkit-text-decoration-skip:none;color:#1155cc;text-decoration:underline line-through}.nAjVSlbajO-c0{text-decoration-skip-ink:none;-webkit-text-decoration-skip:none;text-decoration:line-through}.nAjVSlbajO-c23{background-color:#ffffff;max-width:468pt;padding:72pt 72pt 72pt 72pt}.nAjVSlbajO-c22{padding:0;margin:0}.nAjVSlbajO-c9{color:inherit;text-decoration:inherit}.nAjVSlbajO-c24{font-weight:700}.nAjVSlbajO-c13{margin-left:36pt}.nAjVSlbajO-c19{height:11pt}.nAjVSlbajO-c14{font-style:italic}.nAjVSlbajO-c17{text-decoration:none}.nAjVSlbajO-c21{height:20pt}.title{padding-top:0pt;color:#000000;font-size:26pt;padding-bottom:3pt;font-family:"Arial";line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}.subtitle{padding-top:0pt;color:#666666;font-size:15pt;padding-bottom:16pt;font-family:"Arial";line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}li{color:#000000;font-size:11pt;font-family:"Arial"}p{margin:0;color:#000000;font-size:11pt;font-family:"Arial"}h1{padding-top:20pt;color:#000000;font-size:20pt;padding-bottom:6pt;font-family:"Arial";line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}h2{padding-top:18pt;color:#000000;font-size:16pt;padding-bottom:6pt;font-family:"Arial";line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}h3{padding-top:16pt;color:#434343;font-size:14pt;padding-bottom:4pt;font-family:"Arial";line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}h4{padding-top:14pt;color:#666666;font-size:12pt;padding-bottom:4pt;font-family:"Arial";line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}h5{padding-top:12pt;color:#666666;font-size:11pt;padding-bottom:4pt;font-family:"Arial";line-height:1.5;page-break-after:avoid;orphans:2;widows:2;text-align:left}h6{padding-top:12pt;color:#666666;font-size:11pt;padding-bottom:4pt;font-family:"Arial";line-height:1.5;page-break-after:avoid;font-style:italic;orphans:2;widows:2;text-align:left}

Posted by Tim Willis, Project Zero

In late 2022 and early 2023, Project Zero reported eighteen 0-day vulnerabilities in Exynos Modems produced by Samsung Semiconductor. The four most severe of these eighteen vulnerabilities (CVE-2023-24033, CVE-2023-26496, CVE-2023-26497 and CVE-2023-26498) allowed for Internet-to-baseband remote code execution. Tests conducted by Project Zero confirm that those four vulnerabilities allow an attacker to remotely compromise a phone at the baseband level with no user interaction, and require only that the attacker know the victim's phone number. With limited additional research and development, we believe that skilled attackers would be able to quickly create an operational exploit to compromise affected devices silently and remotely.

The fourteen other related vulnerabilities (CVE-2023-26072, CVE-2023-26073, CVE-2023-26074, CVE-2023-26075, CVE-2023-26076 and nine other vulnerabilities that are yet to be assigned CVE-IDs) were not as severe, as they require either a malicious mobile network operator or an attacker with local access to the device.

Affected devices

Samsung Semiconductor's advisories provide the list of Exynos chipsets that are affected by these vulnerabilities. Based on information from public websites that map chipsets to devices, affected products likely include:

  • Mobile devices from Samsung, including those in the S22, M33, M13, M12, A71, A53, A33, A21s, A13, A12 and A04 series;
  • Mobile devices from Vivo, including those in the S16, S15, S6, X70, X60 and X30 series;
  • The Pixel 6 and Pixel 7 series of devices from Google; and
  • any vehicles that use the Exynos Auto T5123 chipset.

Patch timelines

We expect that patch timelines will vary per manufacturer (for example, affected Pixel devices have received a fix for all four of the severe Internet-to-baseband remote code execution vulnerabilities in the March 2023 security update). In the meantime, users with affected devices can protect themselves from the baseband remote code execution vulnerabilities mentioned in this post by turning off Wi-Fi calling and Voice-over-LTE (VoLTE) in their device settings, although your ability to change this setting can be dependent on your carrier. As always, we encourage end users to update their devices as soon as possible, to ensure that they are running the latest builds that fix both disclosed and undisclosed security vulnerabilities.

Four vulnerabilities being withheld from disclosure

Under our standard disclosure policy, Project Zero discloses security vulnerabilities to the public a set time after reporting them to a software or hardware vendor. In some rare cases where we have assessed attackers would benefit significantly more than defenders if a vulnerability was disclosed, we have made an exception to our policy and delayed disclosure of that vulnerability.

Due to a very rare combination of level of access these vulnerabilities provide and the speed with which we believe a reliable operational exploit could be crafted, we have decided to make a policy exception to delay disclosure for the four vulnerabilities that allow for Internet-to-baseband remote code execution. We will continue our history of transparency by publicly sharing disclosure policy exceptions, and will add these issues to that list once they are all disclosed.

Related vulnerabilities not being withheld

Of the remaining fourteen vulnerabilities, we are disclosing four vulnerabilities (CVE-2023-26072, CVE-2023-26073, CVE-2023-26074 and CVE-2023-26075) that have exceeded Project Zero's standard 90-day deadline today. These issues have been publicly disclosed in our issue tracker, as they do not meet the high standard to be withheld from disclosure. The remaining ten vulnerabilities in this set have not yet hit their 90-day deadline, but will be publicly disclosed at that point if they are still unfixed.

Changelog

2023-03-21: Removed note at the top of the blog as patches are more widely available for the four severe vulnerabilities. Added additional context that some carriers can control the Wifi calling and VoLTE settings, overriding the ability for some users to change this setting.

2023-03-20: Google Pixel updated their March 2023 Security Bulletin to now show that all four Internet-to-baseband remote code execution vulnerabilities were fixed for Pixel 6 and Pixel 7 in the March 2023 update, not just one of the vulnerabilities, as originally stated.

2023-03-20: Samsung Semiconductor updated their advisories to include three new CVE-IDs, that correspond to the three other Internet-to-baseband remote code execution issues (CVE-2023-26496, CVE-2023-26497 and CVE-2023-26498). The blogpost text was updated to reflect these new CVE-IDs.

2023-03-17: Samsung Semiconductor updated their advisories to remove Exynos W920 as an affected chipset, so we have removed it from the "Affected devices" section.

2023-03-17: Samsung Mobile advised us that the A21s is the correct affected device, not the A21 as originally stated.

2023-03-17: Four of the fourteen less severe vulnerabilities hit their 90-day deadline at the time of publication, not five, as originally stated.

Kategorie: Hacking & Security