{"id":27977,"date":"2023-03-19T14:17:27","date_gmt":"2023-03-19T21:17:27","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=27977"},"modified":"2023-03-19T14:17:27","modified_gmt":"2023-03-19T21:17:27","slug":"sb-2023-03-19","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2023\/03\/sb-2023-03-19\/","title":{"rendered":"Security Bits \u2014 19 March 2023"},"content":{"rendered":"<h2>Deep Dive \u2014 Critical Android Base-Band Vulnerabilities&#x2757;<\/h2>\n<p><em><strong>TL;DR:<\/strong> this is bad \u2014 remote code execution without user interaction over the cellular network, combined with the usual level of security confusion that goes with Android&#8217;s model. Unless your Android device is on the list of known-patched devices, or unless your vendor has explicitly announced that they are not using an affected cellular modem, assume you are in danger, and apply the workaround (turn off Wi-Fi calling &amp; Voice-over-LTE AKA VoLTE).<\/em><\/p>\n<p>Mobiles phones contain a sub-system designed for communicating with cellular networks. These sub-systems handle the radio communications between the phones and the cell towers, and they are highly independent from the rest of the phone, they don&#8217;t just have their own firmware, they contain an independent processor, and run their own mini OS. This mini OS has a privileged relationship with the phone&#8217;s primary OS, making it possible for malware to migrate from the base-band OS to the core Android OS, and to do so with system-level privileges.<\/p>\n<p>Different cellular modem manufacturers use different hardware, firmware, and software for their base-band chips, so these kinds of vulnerabilities don&#8217;t generally affect all Android devices.<\/p>\n<p>Google&#8217;s Project Zero have announced the existence of four critical bugs that allow an attacker knowing nothing more than a victim&#8217;s cellphone number to remotely take over the devices without any user interaction, and entirely stealthily. This is the kind of vulnerability that grey-hat companies like <a href=\"https:\/\/en.wikipedia.org\/wiki\/NSO_Group\">the NSO group<\/a> leverage to create spyware products like the infamous <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pegasus_(spyware)\">Pegasus<\/a>. That level of access would of course also be a positive boon for cyber criminals who could steal passwords, private keys, MFA codes, and more in order to steal identities, money, and cryptocurrency wallets.<\/p>\n<p>Most unusually, the Project Zero team have chosen to withhold the details of the vulnerabilities despite the using 90-day window having expired. These bugs are so bad they are making a rare exception.<\/p>\n<p>As well as not knowing how the bugs work, we only have a vague idea of what devices are and are not affected. We know that Google have patched the vulnerabilities in the latest software updates for their Pixel phones and that many Samsung devices are affected, but beyond that, there&#8217;s very little clarity.<\/p>\n<p>Thankfully there is a workaround for anyone not using a Pixel device \u2014 turn off Wi-Fi calling and Voice-over-LTE (VoLTE).<\/p>\n<p>If you&#8217;re using a non-Pixel Android device, apply the workaround now, and check with your manufacturer whether or not your device has a patch for <code>CVE-2023-24033<\/code>.<\/p>\n<h3>Links<\/h3>\n<ul>\n<li>Project Zero&#8217;s Vulnerability Announcement \u2014 <a href=\"https:\/\/googleprojectzero.blogspot.com\/2023\/03\/multiple-internet-to-baseband-remote-rce.html\">googleprojectzero.blogspot.com\/\u2026<\/a><\/li>\n<li>An excellent explanation of what a baseband chip is, and what little we know about these vulnerabilities: <a href=\"https:\/\/nakedsecurity.sophos.com\/2023\/03\/17\/dangerous-android-phone-0-day-bugs-revealed-patch-or-work-around-them-now\/\">Dangerous Android phone 0-day bugs revealed \u2013 patch or work around them now! \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>&#x2757; Action Alerts<\/h2>\n<aside class=\"small-aside\">Calls to action, if any stories in this section are relevant to you there is some action you should take.<\/aside>\n<ul>\n<li>Last Tuesday was <em>Patch Tuesday<\/em>, and Microsoft released fixes for 74 vulnerabilities, including two zero-day bugs that are being actively exploited, so patch ASAP! \u2014 <a href=\"https:\/\/krebsonsecurity.com\/2023\/03\/microsoft-patch-tuesday-march-2023-edition\/\">krebsonsecurity.com\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2023\/03\/15\/microsoft-fixes-two-0-days-on-patch-tuesday-update-now\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Worthy Warnings<\/h2>\n<aside class=\"small-aside\">Potentially relevant warnings from government organisations, public interest groups, or the security community.<\/aside>\n<ul>\n<li>Keep an eye out for firmware updates for your Windows laptops: <a href=\"https:\/\/kb.cert.org\/vuls\/id\/782720\">https:\/\/kb.cert.org\/vuls\/id\/782720 \u2014 kb.cert.org\/\u2026<\/a> &amp; <a href=\"https:\/\/nakedsecurity.sophos.com\/2023\/03\/07\/serious-security-tpm-2-0-vulns-is-your-super-secure-data-at-risk\/\">TPM 2.0 vulns \u2013 is your super-secure data at risk? \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Notable News<\/h2>\n<ul>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/23\/03\/18\/ftc-finalizes-epics-245m-fine-over-fortnite-dark-pattern-usage\">Epic must pay $245M after luring customers into &#8216;Fortnite&#8217; purchases \u2014 appleinsider.com\/\u2026<\/a> (so-called <em>Dark Patterns<\/em>, i.e. UI designed to trick people)<\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/23\/03\/08\/vpn-access-now-open-to-all-google-one-subscribers\">VPN access now open to all Google One subscribers \u2014 appleinsider.com\/\u2026<\/a><\/li>\n<li>&#x1f1ec;&#x1f1e7; WhatsApp have joined Signal is making it clear that they would rather leave the country than comply with the UK&#8217;s controversial proposed <em>&#8216;Online Safety Bill&#8217;<\/em> which would ban true end-to-end encryption in the name of detecting CSAM \u2014 <a href=\"https:\/\/www.bbc.com\/news\/technology-64863448\">www.bbc.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Excellent Explainers<\/h2>\n<aside class=\"small-aside\">High-quality content explaining a security concept of some kind.<\/aside>\n<ul>\n<li>For added security, Apple are pushing cloud storage apps away from kernel extensions to their <em>File Provider<\/em> API, this article expertly explains what this change means for users: <a href=\"https:\/\/tidbits.com\/2023\/03\/10\/apples-file-provider-forces-mac-cloud-storage-changes\/\">Apple\u2019s File Provider Forces Mac Cloud Storage Changes \u2014 tidbits.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Palate Cleansers<\/h2>\n<aside class=\"small-aside\">Anything upbeat and nerdy Bart and\/or Allison think you might enjoy.<\/aside>\n<ul>\n<li><strong>From Allison:<\/strong> some hilarious but insightfully useful advice \u2014 <a href=\"https:\/\/mastodon.social\/@ryanschultz\/109966913719569546\">mastodon.social\/\u2026<\/a><\/li>\n<li><strong>From Steve:<\/strong> An Internet troll worth following: <a href=\"https:\/\/www.reddit.com\/r\/KenM\/\">KenM on Reddit<\/a><\/li>\n<\/ul>\n<h2>Legend<\/h2>\n<p>When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by <a href=\"https:\/\/bartb.ie\/\">Bart<\/a>.<\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\">Emoji<\/th>\n<th align=\"left\">Meaning<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\">&#x1f3a7;<\/td>\n<td align=\"left\">A link to <strong>audio content<\/strong>, probably a podcast.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">&#x2757;<\/td>\n<td align=\"left\">A <strong>call to action<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><em>flag<\/em><\/td>\n<td align=\"left\">The story is particularly relevant to people living in a <strong>specific country<\/strong>, or, the organisation the story is about is affiliated with the government of a specific country.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">&#x1f4ca;<\/td>\n<td align=\"left\">A link to <strong>graphical content<\/strong>, probably a chart, graph, or diagram.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">&#x1f9ef;<\/td>\n<td align=\"left\">A story that has been <strong>over-hyped<\/strong> in the media, or, <em>&#8220;no need to light your hair on fire&#8221;<\/em> &#x1f642;<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">&#x1f4b5;<\/td>\n<td align=\"left\">A link to an article behind a <strong>paywall<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">&#x1f4cc;<\/td>\n<td align=\"left\">A <strong>pinned<\/strong> story, i.e. one to keep an eye on that&#8217;s likely to develop into something significant in the future.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">&#x1f3a9;<\/td>\n<td align=\"left\">A <strong><em>tip of the hat<\/em><\/strong> to thank a member of the community for bringing the story to our attention.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Deep Dive \u2014 Critical Android Base-Band Vulnerabilities&#x2757; TL;DR: this is bad \u2014 remote code execution without user interaction over the cellular network, combined with the usual level of security confusion that goes with Android&#8217;s model. Unless your Android device is on the list of known-patched devices, or unless your vendor has explicitly announced that they [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":19030,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[515,5731,1359,581,50,569,2003],"class_list":["post-27977","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-android","tag-chips","tag-google","tag-radio","tag-security","tag-security-bits","tag-vulnerabilities"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2019\/08\/security_bits_logo_400px_no_alpha.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/27977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=27977"}],"version-history":[{"count":1,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/27977\/revisions"}],"predecessor-version":[{"id":27978,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/27977\/revisions\/27978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/19030"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=27977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=27977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=27977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}