Hit Subscribe!

Don’t Be a Noob, Subscribe Already!

Android

Fear Not: The Samsung Galaxy Backdoor Exploit Demystified

Yesterday, the Free Software Foundation published an article written by Paul Kocialkowski. A software developer for the the Android fork system Replicant, Paul stated that his organization discovered, and later patched, a “backdoor” vulnerability that existed in older Samsung Galaxy devices, including our beloved Galaxy S3s. Only problem is, it’s kind of bullshit—but we’ll get to that later.

The post detailed a program that runs on the device’s radio (baseband + modem), potentially allowing for a backdoor that could read, write, and modify system files on the device’s storage from the processor. “We discovered that the proprietary program running on the applications processor in charge of handling the communication protocol with the modem actually implements a backdoor that lets the modem perform remote file I/O operations on the file system”

The article went on to state that Replicant had found a way to close the backdoor, which required an installation of their open-sourced Android fork. “Our free replacement for that non-free program does not implement this backdoor. If the modem asks to read or write files, Replicant does not cooperate with it.”

Hmm…so the fix is to use their software, interesting.

Why It’s Bullshit

The article and exploit have been effectively debunked, thanks to a tip to XDA from an anonymous security expert. Basically, making this backdoor actually work would “require a modified firmware with with security features disabled”.

This means that if you’ve accepted a firmware update in the last year, which you probably have, then you’re safe. In addition to that, our devices now run SELinux (a security module in Linux kernels, ie. Android), which all but closes the door on this type of potential attack.

Why Did They Do It

Replicant is a free, fully open-sourced Android distribution, or fork. As such, they take great strides in building ROMs that are indeed open, from their source code to their apps—so much so that they even substitute Google’s proprietary apps with open source alternatives. While it may not be great to the average end user, open source apps have been steadily gaining ground, even if most of us will replace them for the more polished, closed sourced versions. But the one area where open source stalls are with proprietary device drivers, causing headaches to devs trying to port things like Bluetooth and LTE functionality. Groups like CyanogenMod use general workarounds to make everything functional, but that’s usually at the cost of stability, since OEMs like Samsung will just about always include proprietary code into basic functions.

A post like the one written by Paul is great in that it points out security flaws, but this case seemed quite self-serving. Not only did they tout their “fix” and their software, but by calling out Samsung, they hoped to make some waves within the consumer community. If we read the post and get angry enough, enraged emails and tweets to Samsung could elicit a response. But more than that, an uproar can cause the OEM to actually release their code, in this case for the modem/processor, which in turn makes forks like Replicants much more stable, since they can infuse the original code from the manufacturer.

But in this case, I wouldn’t count on it, or even a response from Samsung. The internet did its job, and we can rest assured that the hit in credibility to Replicant, as well as the Free Software Foundation, will hopefully curb this type of fearmongering sensationalism…hopefully.

Just updated your iPhone? You’ll find new emoji, enhanced security, podcast transcripts, Apple Cash virtual numbers, and other useful features. There are even new additions hidden within Safari. Find out what’s new and changed on your iPhone with the iOS 17.4 update.

Security concept image via Shutterstock

Source

 

Hey there, just a heads-up: We’re part of the Amazon affiliate program, so when you buy through links on our site, we may earn a small commission. But don’t worry, it doesn’t cost you anything extra and helps us keep the lights on. Thanks for your support!”

Avatar

GadgetBytes

About Author

Leave a comment

Your email address will not be published. Required fields are marked *

Productivity & Shortcuts

Android

Google Gemini Arrives on Older Android Phones

May fragmentation not get in the way of AI.
Android

Satechi’s New Charging Stands Are Ready for Qi2 and MagSafe

The new charging stands are compatible with MagSafe iPhones and upcoming Qi2 Android phones.

Add A Knowledge Base Question !

You will receive an email when your question will be answered.

+ = Verify Human or Spambot ?