How To Tame Your Unicorn - Exploring and Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones

Presented at Black Hat USA 2021, Aug. 4, 2021, 2:30 p.m. (40 minutes).

The exploration of baseband security has come a long way in the past decade. Published research has exposed privacy issues in 3GPP protocols from GSM to LTE and traditional memory safety vulnerabilities in implementations of various chipset vendors. Yet, in some ways, we have only scratched the surface.

For one, almost all published memory corruption bugs have been classic TLV parsing vulnerabilities in Layer 3 GSM. For another, previous remote exploitation demonstrations looked at basebands as more code doing typical input parsing without considering the maze of hardware elements that surround them and stayed inside the baseband sandbox.

We have set out to challenge the status quo with our research into the newest iterations of Huawei's Kirin SoCs. After Pwn2Own 2017, Huawei stopped supporting unlocked bootloaders, introduced new firmware encryption for SoC components, and invested heavily in improving code quality from the well-known baseband source leak. In fact, the latest Kirin chipsets that have been the subject of published research are from 2016.

We will cover our journey from unlocking the newest generations of Huawei devices through identifying and exploiting bootloader vulnerabilities to building a debugger and reversing new mitigation improvements of the baseband OS. We will dive into a part of the 3GPP stack that hasn't received much attention before and present our results of reversing Huawei's implementation and finding remotely exploitable vulnerabilities that work differently from previously documented baseband memory corruption bugs.

Finally, we will investigate the ways a baseband interacts with the rest of the SoC. We will show a handful of vulnerabilities that we have found, both in software and hardware, and explain how we exploited them to escape from the baseband and take over not only Android and the Linux kernel, but even TrustZone.


Presenters:

  • Lorant Szabo - Security Researcher, TASZK Security Labs
    Lorant Szabo is a security researcher at TASZK Security Labs. An electrical engineer by trade with an MSc from BME, he got introduced to the infosec world by joining the !SpamAndHex CTF team 5 years ago. He has been an avid CTF player and explorer of hardware hacking and embedded and wireless security ever since. He has never met a hardware requirement that he didn't want to DIY from scratch and his co-workers call him the frequency whisperer, which is an inside joke that he doesn't like very much.
  • Daniel Komaromy - Director of Security Research, TASZK Security Labs
    Daniel Komaromy earned computer science degrees from BME and Georgia Tech. He's worked in the mobile security field ever since, gaining a decade-plus of vulnerability research experience playing both defense and offense. At Qualcomm, he hunted baseband 0-days, authored exploit mitigations, trained developers, and fought the SDLC machine. Later, he worked as a security consultant in the automotive security industry, followed by years of playing offense: at Pwn2Own, at CTFs around the world, and also for real. Today he is the founder and director of security research at TASZK Security Labs, still following the motto: there's no crying in baseband!

Links:

Similar Presentations: