Hacker News new | past | comments | ask | show | jobs | submit login
Google: Turn off VoLTE, Wi-Fi calling: severe Exynos modem vulnerabilities (9to5google.com)
341 points by dmitrygr on March 17, 2023 | hide | past | favorite | 156 comments



Ok go turn off VoLTE.... unless your carrier did the following

  * “Google Pixel devices received software updates in 2021 that automatically enabled VoLTE and removed the toggle.”


Unneeded on pixel devices per the project zero announcement [0]:

> affected Pixel devices have already received a fix for CVE-2023-24033 in the March 2023 security update

[0] https://googleprojectzero.blogspot.com/2023/03/multiple-inte...


I am still running the February update on my Pixel 6. When I check for updates, I don't see one.


+1, no March update on pixel 6a yet


Chiming in to say the same thing.


+1 too.


But some Pixel phones haven't gotten the March 2023 security update yet, per the article.


[flagged]


Let me clarify: it's not that some Pixel owners just haven't installed the March update yet. It's that Google hasn't released it it for some Pixel models.


Is there any way to mitigate VoLTE on Pixel 6?

I see I can turn off Wi-Fi calling (which I did long ago because it never worked), but no toggle and no march update available.


I believe switching the "preferred network" back to 3G (in the SIM settings) does this. VoLTE is 4G/5G.


Google has not released the March update for Pixel 6, 6 Pro, and 6a.


Hang on - if I understand correctly, all of the following is true for Pixel 6, Pro, and 6a users??

- There's an exploit out there that lets attackers own my phone if they know my number

- A patch is not available for my phone yet

- It's not possible to work around the issue because a previous update removed the toggle

- Announcing this signals to every competent black hat worth their salt to begin looking for exploits on this chipset, knowing the reward is high and the method of pulling it off is implied to be simple

I really wish Google had delayed this blog post until after all of their currently supported flagship products were no longer affected...


> I really wish Google had delayed this blog post until after all of their currently supported flagship products were no longer affected

Aren't they legally required to disclose security vulnerabilities like this within a certain time limit?

Seems like the real anger should be directed at them removing the toggle to turn it off.


I don’t think they’re legally required to do so. However they have a very aggressive publication schedule and selectively making exceptions for Google and not for competitors would look terrible, and possibly expose them to lawsuits.


Some mobile careers no longer operate 3G so turn off VoLTE isn't an option for some people. Google must release patch before this.


Under what law?


This was patched in other models so that gives a head start for people who reverse-engineer such things.

As for Samsung, their March 2023 patch closes items that sound similar. [1]

[1] https://www.sammyfans.com/2023/03/06/samsung-march-2023-secu...


And then everyone here would attack Google for covering up their own vulnerabilities.

This is a sign of integrity.


[flagged]


That’s pretty funny. I just bought a pixel 6a with the intent of replacing my iPhone. About an hour of “how the hell do people put up with this shit” and it’s going. Then I wake up to this.


As a point of comparison a recently inherited a ton of Apple gear and I've been swearing at it in a similar fashion fairly regularly.


Oh I have exactly the same trouble. I’m in the middle of moving back to windows


Switching OS always takes time to adjust. I have the same feeling any time I try to use a Mac or iPhone.


Your brain definitely gets trained on one system and moving off hurts. Hell, I've had my work Macbook for 5 years and I still curse the keyboard shortcuts that are all wrong (and the even more shortcuts that it's missing).


> affected Pixel devices have already received a fix for CVE-2023-24033 in the March 2023 security update

That line is carefully deceptive (lawyerly, even). Pixel 6 series have not yet received the March 2023 update.


The patch was written but withheld due to bugs. So you are not patched yet.


Hi Matthew, could you provide a source? I thought the fix was already being rolled out (or about to get rolled out for the Pixel 6).


Yes I think it was a week late but is now being rolled out. People on Twitter are saying they don’t have it yet, which is the nature of individual experience.

https://9to5google.com/2023/03/06/march-google-pixel-update-...


Google Support said that the Pixel 6 series won't be updated until March 20. This seems horrific to me.


Today is March 23rd. There has been no pixel 6 update since March 5



That is only for CVE-2023-24033 thought, right? Not the other three that haven't been assigned CVE ID's?

> The four most severe of these eighteen vulnerabilities (CVE-2023-24033 and three other vulnerabilities that have yet to be assigned CVE-IDs) allowed for Internet-to-baseband remote code execution.


Ah, that would explain the multiple patches that came in last week on my 7 Pro. I thought it was strange.


LTE is data only, if you want to make a call you need to have VoLTE (voice over LTE). So it's pretty reasonable to prevent disabling this.

I wonder if you can disable LTE entirely and use an older standard.


Many carriers have already retired 3G, so there's nothing left to fall back on if you were to disable 4G/LTE.


2G is still common


2G is still there and isn't going anywhere.


Is it? Wikipedia says that AT&T, Sprint and Verizon have already killed it, with only T-Mobile still going until next year:

https://en.wikipedia.org/wiki/2G#Past_2G_networks

YMMV in other countries of course, but many networks worldwide have already phased it out or are going to soon.


You do realise that there are countries outside of the USA? Australia has no 2G networks and 3G is approaching EOL.


I bought a Motorola RAZR 3G for $0.50 while farting around inside a Cashies a while back

Turns out it was still locked to Telstra, they demanded *$100* to unlock the damn thing, even though they were turning off their 3G network anyway!

Unfortunately all the resources on hacking them has long since succumbed to linkrot, plus getting it hooked up over USB to an XP VM to try and unlock it that way seemed risky


In Germany you move farther out of cities, you are stuck with 2G

[0] https://www.nperf.com/en/map/DE/-/187895.Telekom/signal/?ll=...


Germany and internet connection, I can't comprehend how one of the richest countries in the world, in such a small land mass can have such bad connectivity.

It's really baffling going here from Sweden where I'm starting to get 5G signal outside of core city areas, get 4G almost across the whole country with speeds of 50-100+Mbps, into the city centre of Berlin and there I fallback to 3G networks every 3rd/4th block walking.

Friends living there having terrible experiences with Telekom, almost no fiber available, etc.

Germany should enact something like this policy from here: https://pts.se/sv/bransch/internet/bredbandsstrategin/


> Germany and internet connection, I can't comprehend how one of the richest countries in the world, in such a small land mass can have such bad connectivity.

A combination of toxic financial mindset (back in the early '00s, finance minister Hans Eichel wanted a "balanced" budget and auctioned off the frequency licenses for dozens of billions of euros, saddling the carriers with the debt instead of the government), thoroughly incompetent politicians (Merkel's "Das Internet ist für uns alle Neuland" is just the tip of the iceberg), NIMBYs (sadly, projects for tower construction routinely end up in death threats, and since 5G conspiracies also in actual terrorist attacks), and a populace that to a large degree just doesn't give enough of a fuck.


Merkel is probably the worst German politician since...you know that guy.

Japan has a nuclear accident, caused by a tsunami and partly due to known issues in the power plant. Merkel: "Oh no, let's close down all our nuclear power plants right away."

Merkel: "Oh, we need more energy now when we closed all our nuclear power plants. No problem, my buddy Putin has agreed to build a gas pipeline and provide us will all energy we need."

Putin has been rattling his weapons on the border or Ukraine since 2014. Merkel: "No problem, I called my buddy Putin and he said he will not attack. And by the way, no need for us to invest in our defense. We can continue to have Europe's weakest army per capita as Putin said he would not attack."

Migrant crisis in 2015. Merkel: "Everyone is welcome! Smugglers, just send them here, we will show our solidarity. Oh, we do not have enough schools, daycare, hospitals to take care of them all? Oh, many are lost teenagers and children without parents who took the chance now when we said everyone was welcome? Well, I guess they can earn their living selling drugs and sex."


I agree Merkel was bad, but not that bad - Kohl was inarguably worse.

> Japan has a nuclear accident, caused by a tsunami and partly due to known issues in the power plant. Merkel: "Oh no, let's close down all our nuclear power plants right away."

The entire country was calling for the dismantling of the NPPs, and no one sans the FDP and the Nazis cares much about them any more, not even their operators.. As for the gas pipeline, thank former Chancellor Schröder for that one.

> Putin has been rattling his weapons on the border or Ukraine since 2014. Merkel: "No problem, I called my buddy Putin and he said he will not attack. And by the way, no need for us to invest in our defense. We can continue to have Europe's weakest army per capita as Putin said he would not attack."

A valid point, but one shared across the political spectrum except the Greens - everyone else from left to right and the entire leadership of the German industry was blinded by the prospect of cheap energy. It is unfair IMO to single out Merkel there.

> Migrant crisis in 2015. Merkel: "Everyone is welcome! Smugglers, just send them here, we will show our solidarity. Oh, we do not have enough schools, daycare, hospitals to take care of them all? Oh, many are lost teenagers and children without parents who took the chance now when we said everyone was welcome? Well, I guess they can earn their living selling drugs and sex."

The first part is a blank reproduction of common Nazi conspiracy myths - the "pull factor" has been thoroughly disproven by now, even with the EU being a deadly fortress at its borders, still thousands of people attempt to cross the Mediterranean each year. The latter is one of the worst interpretations you can give - I'd put that one rather on bland disinterest and fear of the far-right, not an intention to push people off to selling drugs.


haha, all but one 2G network in the USA is gone, so I suspect they are not from the USA, actually.


At least in the US the 2G networks have already gone. It made news for long-lived devices like cars and ebook readers that had 2G modems built-in.

Nissan Leafs used AT&T and it was shut down at the end of 2016.

https://www.greencarreports.com/news/1102612_nissan-leaf-con...


It's around for a little more than a year more on T-Mobile: https://www.t-mobile.com/support/coverage/t-mobile-network-e...

Some areas were never built out with 2G but for the footprint that was always there they have not turned it off since it doesn't impact their spectrum very much. AT&T had poor spectrum planning so had to kill it off sooner to refarm the spectrum.


I'm not sure why you're being downvoted.

I was on an EDGE connection in Mexico just last month.


Because 2G has already been sunset or has date set for sunset by most carriers around the world.


The Swedish regulator PTS intends to re-assign frequencies in the 900 MHz-, 2.1 GHz- and 2.6 GHz bands during 2023. This will most definitely sunset 2G and 3G in Sweden. With 1800 MHz already being re-assigned in 2017.


I thought 2G was still being supported for emergency services in the USA?


No you can’t. 3G SIMs were flagged a while back and the account holders were notified of the retirement. At one point they started blacklisting SIMs that connected to 3G because customers didn’t upgrade.

Careful if you put your SIM in a 3G only phone it may get blacklisted and you’ll need a new one.

Source: work at a carrier.


This BlackHat talk from 2021 seems relevant: https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Over-T...

It’s (probably) not the same bug, but gives you an idea of the state of baseband security and the attack surface. The baseband is an ARM chip running an RTOS.

The security situation is not pretty. We have here an XML parser running in the baseband RTOS which has a stack overflow bug. There are no stack canaries and it looks like there’s no ASLR or even NX so they get trivial shellcode execution. Although they didn’t demonstrate persistence or AP compromise, I can’t imagine either of those would be hard from the privileged baseband, especially if the baseband drivers are as bad as the baseband firmware seems to be.


Great work from P0 (and Keen lab).

but this statement about baseband mitigations is only partially true. Huawei Balong platform has ASLR and stack canaries now (and some Infineon too I believe), and all baseband platforms are improving (even Mediatek). I didn't check Qualcomm lately, but they have a lot of similar protections now.

It's not trivial to do a pivot to AP on modern iPhones or Android phones (excluding some categories) - especially with PAC (and MTE coming).

But yeah, (Samsung) Shannon are an attractive target for attackers due to easily obtainable firmware, strings, DWARF (elf) firmware that you can find and relatively good debugging platform. The bugs are generally pretty low hanging too.

This isn't the same on Qualcomm platforms (Hexagon is notoriously hard to RE and debug), or the iPhone platforms.


Plus DART/IOMMU, I would imagine?


Yep in most cases, but not always configured the best. Logic flaws seem the best way to go :)


Yep. And the interface is not easily accessible for normal users so it's hard to fuzz, we're at the mercy of telcos telco-connected vendors for security testing.


Although this is a vulnerability in Samsung Exynos chipsets, ironically most Samsung flagship phones sold in the US shouldn't be affected because they use Qualcomm chipsets there rather than their own. The variants sold in Europe and Asia tend to have Exynos chipsets though, with the exception of the S23 series which is Qualcomm everywhere.


According to https://googleprojectzero.blogspot.com/2023/03/multiple-inte..., this likely affects:

> Mobile devices from Samsung, including those in the S22, M33, M13, M12, A71, A53, A33, A21, A13, A12 and A04 series

...and many others.


Right but it depends where the device was sold. A Galaxy S22 intended for Europe is built with a vulnerable Exynos SOC but a Galaxy S22 built for the US has a Snapdragon.


Yes, and most of those are not sold in the US.

And you seem to be missing that of Samsung puts out Qualcomm and Exynos versions of the same phone, sharing a model number with a phone on that list doesn't preclude it from being unaffected


Most of the lower end/mid-range phones with Exynos chips have Exynos chips in the US too e.g. A53.


We got our A53's on Amazon, it shows on their product page it uses the Exynos chipset. There's also no option in the settings to disable VoLTE.


I just had a chat with Samsung support. They seem pretty clueless about the whole thing, and brushed off the disclosure on the semiconductor.samsung.com site as "not the official Samsung USA site".

There doesn't seem to be a user-friendly way to determine for sure which chipset you have. I think at the very least, Samsung ought to publish a little app for that immediately.


That's interesting. People here in Europe hate Exynos chipsets, they say they are worse than Qualcomm. Are they giving up on them finally?


The Exynos variants usually are worse than the Qualcomm ones, the cynical take was that most prominent phone reviewers are based in the US so giving that market the superior chipset served to bait-and-switch the other markets into buying inferior hardware. It remains to be seen if Exynos will return for the S24 or they'll stick with Qualcomm across the board.


> the cynical take was that most prominent phone reviewers are based in the US

I don't think that's true, most of the reviews I read and watch on YouTube are made in Europe, UK, India.

When I worked at Samsung the reason was two-fold:

- There's a lot of internal competition, having two SoC suppliers for your flagship phones gives you leverage against both Qualcomm and in-house teams.

- Samsung treads lightly with US carriers. Using Qualcomm modems makes their certification process and field testing easier.


Dunno, the real complaint against exynos in favour of Qualcomm other than tribalism is that a lot of stuff was developed for Qualcomm with Adreno and not whatever GPU Exynos spouted at the time (custom weird thing early on, then PowerVR, nowadays Adreno). In USA they used Qualcomm due to CDMA shenanigans mainly.

Oh, and stuff like qualcomm-specific hacks people were used to from Jail broken HTC devices (like phone call recording) not working. Final minority complaint was essentially based on qualcomm devices being more popular so you had more resources for custom roms, despite the fact that Exynos meant no need to do complicated jailbreak to load a custom rom.

Personally I found no issue with Exynos chips whatsoever. Always some of the fastest stuff I had in my hands.


Most benchmarks showed Exynos falling behind in both performance and power effeciency for years. I don't know if this is still the case with the latest models, but many Exynos phones were also plain worse than their Qualcom counterparts.

Quite sad, really, because the space can use some competition.


It is still the case. This team went deep into benchmarking mobile chipset power efficiency, Exynos does not do well.

https://www.youtube.com/watch?v=s0ukXDnWlTY


That's very unfortunate. With their vertical integration, Samsung is one of the few companies that can actually compete with Apple if they can get the tech up to spec.


Can you source your claim that Exynos used weird GPUs? AFAIK, Exynos mostly used ARM Mali (the default for ARM chips) cores with the exception of the most recent iteration when they formed a partnership with AMD to use RDNA in the 2200 model. I am absolutely sure no Exynos chip ever used Adreno and I also think they never used PowerVR.


I mixed up Mali with Adreno, my fault.

As for weird GPUs, the S3C2410 (which got renamed as Exynos post-factum) used weird Samsung-designed GPU (doubly weird because it was GLES2-only GPU yet Samsung Android phones had GLES 1.1 only on it). Then first few generations (Galaxy S, S2, S3, S4) used PowerVR GPUs


The Exynos 5410 (for instance in the Galaxy S4) had a PowerVR GPU. Afaik that's the only one, Samsung was already using ARM Mali extensively then.

The Hummingbird (Galaxy S and iPhone 4) had one too but arguably it became part of the Exynos line-up after the fact.


Thank you for the correction. I did not know about those 2 examples.


I hope it goes the other way. My recollection is that the Exynos phones were able to be bootloader unlocked and flashed with other ROMs while the Qualcomm ones were locked down forever. I've stayed away from Samsung phones for that reason.


The latest S23 ditches the Exynos variant


Does that make it easier to get root on a US-based Samsung phone? Or US band compatible anyways?


"Tests conducted by Project Zero confirm that those four vulnerabilities allow an attacker to remotely compromise a phone at the baseband level with no user interaction, and require only that the attacker know the victim’s phone number. With limited additional research and development, we believe that skilled attackers would be able to quickly create an operational exploit to compromise affected devices silently and remotely."

Funsies...


It's skilled attackers in proximity with radio gear and a laptop, right? This sucks for a lot of people but I don't think I'm on the list of targets such actors would care about.


Just because you have nothing valuable to steal from your house, doesn't mean you shouldn't make sure the front door is locked!


I find myself wishing more and more for a wifi‐only tablet in a phone form factor.

Sure, I recognize that I’m in the minority here, as someone who keeps his phone in airplane mode/wifi‐only mode all the time. But it doesn’t mean giving up much: most of my messaging (including replying to texts and checking voicemails) can be done from the browser, GPS navigation works fine without an internet connection (maps can be trivially preloaded), and when I desperately need internet access while driving I can pull into any Starbucks, McDonalds, or Walmart.

Mostly I do this for philosophical reasons (basically, purposely downgrading the importance of phone notifications relative to what activities I’m physically doing at a given time), but the security advantage of smaller attack surface is a benefit I hadn’t considered.


It existed. It was called the iPod Touch. It was a full iPhone without a cellular modem.

It was discontinued, assumedly for low sales as more and more people gave their kids either iPads or hand me down iPhones instead of buying iOS touches like they used to.


There was also the Samsung Galaxy Player. Discontinued long ago.

https://en.m.wikipedia.org/wiki/Samsung_Galaxy_Player


Is a phone without a SIM card any equivalent, or just the fact it has the ability to have a SIM card means the attack surface is too big?


If your goal is to reduce your attack surface, then yes, even a modem without a SIM is too much.

The modem in your phone isn't like a modem from the days of dialup, it's more like a cable modem. More often than not, the modem is its own entire microprocessor, ram, i/o, etc and then communicates with the device's CPU over a mixture of serial, i2c, spi, or other busses. For instance, in my Pinephone, the modem is a Qualcomm MDM9607, which is a single core arm cpu that has 256mb of ram and 256mb of nand on its package, it literally runs its own entire operating system (linux in its case) separate from what the CPU of the phone does.

This CPU can also have its own connection to the battery, which is how, for example, iPhones can remain 'findable' even when the phone's CPU is otherwise powered off and at rest. The modem sips at the little remaining power in the battery to power itself and the GPS chip to report the devices location.

As for 'removing the sim' that doesn't prevent the device from connecting to a network, just authenticating with it, typically. Your sim card is just a standard identifier and a little bit of storage that the modem can read and write to for things like storing contacts and SMS messages. All of which can be done in software as well (known as an eSIM these days).

Edit: Here's a link to the wiki page on the Pinephone's modem, just to give you an idea of what a cell phone's modem can be capable of, and keep in mind, it uses a rather old, outdated, and unpopular modem, other modems may have more features: https://wiki.pine64.org/wiki/PineModems


I don't think it's equivalent judging by the fact that you can still make emergency calls, which means it's able to talk to the network anyway. I remember than an older Samsung I had (GS3 IIRC) would show the signal level even withou a SIM installed.

Don't know what happens when you put it in airplane mode, though.


One caveat here ...

The baseband processor also performs real time audio and noise cancelling functions.

So while I have had some decent luck with VOIP and dialer apps that live solely in the application layer, voice quality and noise cancelling, etc., may not ever be as good as what the RTOS in the baseband can provide.


Do you have a source?


The source code for baseband software needs to be open source, I expect there are many more such vulnerabilities. I also wonder how many basebands contain Linux and are GPL violating.


None use Linux, most just use BSD licence software (or things like openssl). I haven’t seen any GPL code at all tbh.

But yep, would be nice if it was open source, although not sure how much that would help (only if sufficiently motivated auditors can be bothered to look at it). A bunch of baseband firmware is even encrypted on disk now (loaded into BB memory from the kernel)


Quectel EG25-G is running linux

https://nns.ee/blog/2021/04/01/modem-blog.html


I had a home 4G router for a while, a TPLink 200 something. The 4G modem inside was a full Android device ! See here https://openwrt.org/toh/tp-link/archer_mr200?datasrt=%5Efirm...


I didn’t check, and on mobile now. But I would be very surprised if that was the actual baseband (more just a wrapper around it).


So I got a little bit of time to check (https://github.com/Biktorgj/quectel_eg25_recovery/tree/EG25G... - the NON-HLOS), and it's still actually running a Qualcomm Hexagon baseband (40mb binary by Qualtec when combined using Gal's unify_trustlet script).

Load that into Hexagoon IDA plugin and you'll see it's bog standard Hexagon for all the remote GSM/LT code that actually does stuff (similar to the project zero research). I haven't verified (and don't own a Pinephone) but most Quectel boards I've seen in the past do enforce signature validation, so binary patches are not easy.


> Project Zero’s advice for those impacted follows:

>> Until security updates are available, users who wish to protect themselves from the baseband remote code execution vulnerabilities in Samsung’s Exynos chipsets can turn off Wi-Fi calling and Voice-over-LTE (VoLTE) in their device settings. Turning off these settings will remove the exploitation risk of these vulnerabilities.

> Google Pixel devices received software updates in 2021 that automatically enabled VoLTE and removed the toggle.

That's some great advice.


If you turn off VoLTE and Wi-Fi calling, I don't think you can get calls in the US, so I'm not suprised VoLTE can't be disabled.


I don't know about you, but I'd way rather not be able to get calls until Monday than be vulnerable to this exploit.


If you are currently, you probably have been vulnerable to this and many other undisclosed vulns for years, 3 days isn't going to move the needle much in terms of risk, but indeed it is a step to take.


Doesn't everyone knowing the vulnerability exists now move the needle significantly?


That's probably the right choice, if there's a firmware update on Monday. If not, it's probably time to buy a new phone.


Isn't LTE part of 4G? What about 5G?


even in Androids phone diagnostics?

    *#*#4636#*#*


This is great news!

Hear me out: we've long known that the current state of modems running their own tiny buggy unpatched is with way too much access to the device has been bad but no one could do much about it. A severe exploit like this doing actual damage to users of flagship phones from google and Samsung might be enough to finally change that. Unless it hurts the bottom line of those companies severely they won't change it. I think they should have released the info to force them to.



The Google Project Zero blog post implies that all Google Pixel models have received a fix, but really only some of them have, and it doesn't mention that the vulnerability can't be mitigated on them either. The 9to5Google post gets both of these things right, though: "the Pixel 6, 6 Pro, and 6a have yet to see that March update" and "Google Pixel devices received software updates in 2021 that automatically enabled VoLTE and removed the toggle."


So, essentially, you have to disable mobile data as well as wifi calling, thus disabling the ability to be called entirely until they release the march patch. Nice..


Switch the preferred network to 3G should disable VoLTE.


Hmm. WiFi calling is not a big deal. VoLTE however is. Some networks don't even support 2/3G anymore so VoLTE is the only way to make calls there.

I always thought it was ridiculous that LTE didn't come with a built-in voice mode that was just universally supported. VoLTE is more of an add on app on top of of data and a big cause of compatibility problems. It wasn't even finished when the rest of the LTE standard came out so many early phones came without support. And many still have to fall back to 3G during calls due to incompatibilities or networks blocking them due to "not invented here".

It's a mess compared to 2G/3G where you can just stick a sim card into any phone and know it will work just fine.

In a far future a data only network makes sense but we're not there yet and we definitely weren't when LTE was specced. Voice should have been an integral part of the standard.


Ok,so looks like pixel 7 and 7 pro are patched:

> On Pixel phones, the main CVE-2023-24033 vulnerability was fixed with the March 2023 security patch that rolled out on Monday but should have come a week earlier.

> However, the Pixel 6, 6 Pro, and 6a have yet to see that March update and are currently vulnerable.


>On Pixel phones, the main CVE-2023-24033 vulnerability was fixed with the March 2023 security patch that rolled out on Monday but should have come a week earlier.

That means GrapheneOS is already protected against this vuln:

https://grapheneos.org/releases#2023031500

A tip of the hat (and my great thanks) to the GrapheneOS team!


This is a pretty big win for Graphene - nice work. That link mentioned 3/20 as the date Google will release a patch.



Pixel 6, 6a, 6 Pro are NOT protected from this on GrapheneOS. Not yet.


In 2014, Replicant found and fixed similar modem vulnerabilities, which Samsung never patched, AFAIK.

https://www.fsf.org/blogs/community/replicant-developers-fin...

Have we surpassed incompetence and arrived at maliciousness yet?


> allow an attacker to remotely compromise a phone at the baseband level

Aren't modern phones supposedly securely separate the baseband from the OS (Android)? Does this mean that voice and data can be intercepted, but at least other data might be safe?


Pure speculation, but I would guess that the interfaces to baseband are not particularly hardened, so an attack on the phone from the baseband might be trivial. Or worse, the baseband might have a trusted channel to launch arbitrary code.


Android pretty effectively enforces TLS as well.

Also, aside from the surface level issues of a vuln like this, an attacker now has a serious foothold on the device, which is still very bad.


No. The baseband can DMA what it wants, when it wants. The baseband PMIC can power what it wants when wants. The AP is the junior partner.


This is not true on pretty much any phone post 2014ish. Pretty much all platforms have IOMMU's or similar separation mechanisms. source: did baseband vr commercially


Not on MTK chipsets, or at least the older ones I'm familiar with:

https://github.com/varunchitre15/MT6589_kernel_source/blob/m...

Look at the enable_mem_access_protection function.


Basebands have not had DMA for a long time. There can still be vulnerabilities, which it sounds like is what happened here, but there’s no DMA anymore on new phones.


That was (possibly still is) the case on Qualcomm integrated Application and Baseband SoCs, not on Exynos where baseband is the junior partner.


IOUMMU prevents this


..."Users who wish to protect themselves from the baseband remote code execution vulnerabilities in Samsung’s Exynos chipsets can turn off Wi-Fi calling and Voice-over-LTE (VoLTE) in their device settings."

Very kind of them to offer the freedom of choice to all those users who don't want to protect themselves!


Welp, turned off wi-fi calling but can't turn off VoLTE. I can set 3G, but since I'm on Fi, 3G won't work (T-mobile).. I get horrible 5G where I am, so it always goes to LTE.


VoLTE will work over 5G (and sometimes over 3G in esoteric configurations). It is very data centric, even using SIP for call control. A rule of thumb is, any time you have a data connection, VoLTE can be used.

This is why Wi-Fi Calling and VoLTE took off at roughly the same time. Once you can route calls as data, you can offer it over both cellular and Wi-Fi. (Wi-Fi Calling has an additional outer IPsec layer, but it is the same "guts" inside the tunnel.)


> VoLTE will work over 5G

Doesn't 5G use VoNR? Or does VoNR imply the same SIP call format, but just over 5G instead of 4G?


My understanding is that VoLTE/VoNR/VoWiFi is all the same 3G era IMS stack (with updates since then) and thus SIP over IP over either GPRS Tunnel Protocol over low level radio interface or WiFi


That is my understanding of VoNR, but unfortunately I don't have experience with it.


If you are in the US, 3G is done from the big carriers. Verizon was the last hold out, only turning it off at the beginning of this year.


A shame! I have a Nokia Windows Phone that I used on 3.5G for a long time as a second phone, and now it's basically worthless other than maybe for a music player..


Okay, so can Google please consider doing more work to isolate the modem from the application processor in Pixel phones now? This is a disaster, but probably worse than it needs to be.


Did anyone else get a pop up on their Pixel asking to enable WiFi calling earlier in the week? Was that coincidence or related to this issue?


The pixel 6 modem has a bunch of known issues, to my understanding (certainly that's been the consensus when I've looked up solutions to my Pixel not getting a signal in the middle of Seattle until I toggle airplane mode on and off a few times). Hopefully this is the nail in the coffin for this modem series and they go back to using their previous modem


> their previous modem

That's qualcomm. The very idea of google's phone SoCs was to ditch qualcomm


Can we get Project Zero to take a hard look at the next Pixels before they are released, please?

This does not seem an unreasonable ask.


That would be the job of other teams.


If you learned of the myriad of ways in which google is set up to make sure this does not and cannot happen, you'd not sleep for weeks...


I don't think I could care enough about any/all phones to lose sleep for a week+


> Meanwhile, the other 14 vulnerabilities are considered not as severe as they “require either a malicious mobile network operator or an attacker with local access to the device.”

The kind of people with the resources to actively exploit this are the same kind of people who can compel the carriers to transmit whatever they want.


I wonder how you would be able to apply mitigations on carriers (like T-Mobile) that have turned off their 3G service. If you don't have a carrier which supports 3G (or lower), don't you need VoLTE turned on in order to make & receive voice calls?


T-Mobile may still have 2G up, possibly for calling only, but I don't think any other national US carrier has 2G or 3G up and running.


It works for data and calls, not fast but since not much falls to it anymore it seems to rarely be congested. My coverage with it was always better than with their 3G network and I used it years past its prime for conserving battery (until they deployed low-band LTE). You need at least a 3G device to use new sim cards to get on 2G but if you've been a customer a long time and you haven't changed cards, there are still activated ones in the wild that work with old devices (I was able to get calls and SMS to work on a t68i, but needed to use a w810i to get working data when I tried a few months back).


you can get voip service and forward calls there.


yeah I use jmp.chat because I got tired of the whole VoLTE shenanigans.


There is no way to disable volte on a pixel phone. There is a way to disable wifi calling.

:/


Is this a valid mitigation for pixel 6/a/pro?

- Turn off wifi calling

- Turn on airplane mode

And then ensure wifi is on and wait for the March security update.


But I already have the march update?, it arrived on grapheneOS for the Pixel 6 pro


https://grapheneos.org/releases#changelog

> T2B3.230109.009.2023031500 (Pixel 6, Pixel 6 Pro, Pixel 6a) — 2023-03-05 Android patch level but only 2023-03-01 Pixel patch until a March stock OS release is published with updated firmware, etc. (marked as 2023-03-01 overall patch level in the OS)

Your baseband isn't protected. GrapheneOS patched Android, but the complete device set of images (firmware) is still vulnerable. That said, GrapheneOS does seem to implement its own additional baseband hardening.


Good catch!


At a certain point these aren't vulnerabilities and are just backdoors.


That’s like saying an incompetent person who makes a lot of mistakes is somehow transformed into a malicious actor “at a certain point”. It’s just not true. It may help justify your emotional response to consider them so, but it’s not true.


“Once is happenstance. Twice is coincidence. Three times is enemy action”


That saying applies to inexplicable coincidences. It doesn’t mean that everything that happens three times is an attack. I live in Seattle. It rained three times this week. That is not enemy action.


On my Pixel 7, the option to disable appears to be "4G Calling". This does mean in areas where 4G calling is the only option, you're screwed.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: