Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Critical Vulnerability Breaks Android Full Disk Encryption

Most Android Devices Susceptible to Full Device Encryption Bypass

Most Android Devices Susceptible to Full Device Encryption Bypass

A Critical Elevation of Privilege (EoP) vulnerability that affects the majority of Android devices allows an attacker to bypass the Full Device Encryption (FDE) security feature that Google implemented in Android 5.0 Lollipop, researchers discovered.

The security flaw, tracked as CVE-2016-2431, was reported in October 2015, but Google patched it only in May 2016. The issue resides in the Qualcomm Secure Execution Environment (QSEE), a Linux kernel device designed to allow communication between the normal Android operating system and the secure OS that manages protected services and hardware.

The issue was discovered by Gal Beniamini, an independent Israeli researcher who previously detailed an EoP vulnerability in the Widevine QSEE TrustZone application. Tracked as CVE-2015-6639 and patched by Google in January, the bug could enable a compromised, privileged application with access to QSEECOM to execute arbitrary code in the TrustZone context.

Affecting the Qualcomm TrustZone component, CVE-2016-2431 can also be exploited by a local malicious application to execute arbitrary code within the context of the TrustZone kernel, Google revealed in the May 2016 security bulletin. The company didn’t offer additional details on the issue, but Beniamini revealed last week that the bug can be leveraged to break Android’s Full Disk Encryption (FDE) scheme.

A simplified explanation of how FDE works is as follows: the device generates a randomly-chosen 128-bit master key (the Device Encryption Key – DEK) and a 128-bit randomly-chosen salt, and protects the DEK using an elaborate key derivation scheme that leverages user’s unlock credentials. The encrypted DEK is then stored on the device inside an unencrypted structure.

To decrypt the disk, one would need user credentials to decrypt the stored DEK, and Google has implemented several mechanisms to prevent on-device cracking attacks, such as delays between decryption attempts and an option to wipe the user’s information after subsequent failed decryption attempts. Moreover, a step in the key derivation scheme binds the key to the device’s hardware, thus preventing off-device brute-force attacks.

The module that creates the binding is called KeyMaster, and it operates as a QSEE trustlet on Android devices powered by a Qualcomm chipset (basically, it is part of the secure OS). By reverse-engineering the KeyMaster trustlet, Beniamini discovered that the key derivation is not hardware bound and that OEMs can actually break the Full Disk Encryption security feature.

He also notes that the Android FDE is only as strong as the TrustZone kernel or KeyMaster and that the vulnerability can be exploited even on devices with the appropriate patch installed, because the attacker can downgrade the device to a vulnerable version if they have the encrypted disk image. After that, the attacker can extract the key by exploiting TrustZone, and then brute-force the encryption.

“Full disk encryption is used world-wide, and can sometimes be instrumental to ensuring the privacy of people’s most intimate pieces of information. As such, I believe the encryption scheme should be designed to be as “bullet-proof” as possible, against all types of adversaries. As we’ve seen, the current encryption scheme is far from bullet-proof, and can be hacked by an adversary or even broken by the OEMs themselves (if they are coerced to comply with law enforcement),” Beniamini says.

Also highly concerning is the fact that Qualcomm’s processors power around 80% of all Android devices, meaning that most of them are vulnerable to the attack. In fact, Duo Security says that 57% of all Android devices are vulnerable, mainly because many highly popular Andriod smartphones out there have been patched in the meantime.

According to Duo Security researchers, Samsung has been patching popular devices such as Galaxy S6 (75% of them have the security patch level of May 2016 installed), and Galaxy S5 (45% of them are patched), which has a substantial impact over the analyzed dataset. In January, 60% of all Android devices were deemed vulnerable to CVE-2015-6639.

While Nexus 5X and Nexus 6P were never vulnerable, the rest of Nexus devices are. Moreover, the fact that an attacker could downgrade devices susceptible to the attack and then exploit the vulnerability suggests that the number of affected devices could be much higher.

Other Qualcomm Android components were also found to be vulnerable to various types of attacks, and Google’s June 2016 security bulletin focused on patching numerous issues in Qualcomm drivers. However, manufacturers are still far behind with releasing patches for their products and users appear in no hurry to apply the security updates already released, which results in an overwhelming 75% of eligible Android devices lacking the latest patches.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Vulnerabilities

GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet