Q
Problem solve Get help with specific problems with your technologies, process and projects.

How can memory corruption attacks threaten smartphones?

Smartphone users could be at risk of memory corruption attacks because of a baseband vulnerability. Expert Michael Cobb explains the attack and how concerned users should be.

A Comsecuris researcher revealed a baseband vulnerability affecting Huawei smartphones, laptop wireless WAN modules...

and internet of things components that enables memory corruption attacks over the air. How can these attacks take place, and how much risk do they present to users?

Baseband is firmware used in smartphones to connect to cellular networks, send and receive data, and make voice calls. It is also used in internet of things (IoT) devices and automobiles to provide network connectivity. Any vulnerabilities in baseband potentially expose modems to a range of attacks, enabling the attacker to monitor a device's communications, place calls, send text messages or exfiltrate data unbeknownst to the user.

Researcher Ralf-Philip Weinmann, managing director at security firm Comsecuris, demonstrated at the Infiltrate Conference how a baseband vulnerability in Huawei smartphones, laptop wide WAN modules and IoT components could be exploited to execute memory corruption attacks against affected devices over the air.

The overall risk to users is not high at present, as memory corruption attacks are highly technical; Weinmann said that it took him roughly a year to perfect it because he had to reverse-engineer the baseband processor and Global System for Mobile communication protocol stack. However, during Weinmann's demonstration, many of the audience's iPhones connected to his malicious base station when he turned it on. The fake base station ran software called OpenBTS on hardware that cost around $1,500.

This type of setup would allow an attacker to spoof a network operator and send specially crafted packets over the air to crash a phone, cause it to reboot and give the attacker the ability to install a rootkit or backdoor. The technique is most effective against handsets that have a specific architecture in which the baseband processor and the application processor share the same RAM chip.

At the heart of Weinmann's memory corruption attacks are baseband vulnerabilities he found in the Kirin application processor used in HiSilicon Balong integrated 4G LTE modems. HiSilicon Technologies is a subsidiary of Huawei Technologies.

The flawed firmware is present in a number of high-end Huawei Honor smartphones -- an estimated 33 million Honor smartphones were shipped in the third quarter of 2016, with as many as 50% of them likely to be using the flawed HiSilicon Balong modem. The modem may also be found in a number of laptops, IoT and automobile deployments.

Weinmann suspects HiSilicon may have accidentally released the Kirin firmware source code as part of a developer .TAR archive associated with the Huawei H60 Linux kernel data, making it easier to reverse-engineer. He has also disclosed additional critical vulnerabilities to Huawei, whose investigation is still ongoing.

Mobile communications present a significant and growing attack surface that needs across-the-board review and analysis, but testing this technology is risky due to wiretapping laws that make it illegal to intercept licensed frequencies used by wireless carriers.

Lessons learned from this particular research on memory corruption attacks are that users should be wary of connecting to networks at conferences or in other crowded areas, and devices should not be configured to automatically connect to new networks. For vendors, source code development controls and procedures must be watertight to prevent code inadvertently leaking into the public domain.

Ask the expert:
Want to ask Michael Cobb a question about application security? Submit your questions now via email. (All questions are anonymous.)

Next Steps

Find out why managing mobile devices is now an enterprise affair

Discover the top enterprise mobile security systems

Learn about the mobile security tools that last

This was last published in September 2017

Dig Deeper on Mobile security threats and prevention

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What has been your experience with baseband vulnerabilities?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close