Security

Have MAC, will hack: iThings have trivial-to-exploit Wi-Fi bug

Project Zero reveal you really shouldn't skip the upgrade to iOS 11


iThing owners, do not skip iOS 11: it plugs a dead-easy-to-exploit drive-by Wi-Fi bug.

All an attacker needed to own a phone with a vulnerable Broadcom Wi-Fi chip was the target's MAC address, and exploit code running on a laptop.

As shown in this now-unsealed Google bug thread, this discovery by Gal Beniamini – very like one he warned about in April – was first raised in June as an out-of-bounds write.

The thread says an oversized value can be put in the unvalidated “Channel Number” field in code handling Wi-Fi neighbour responses. It's the large value that lets an attacker write to an address that should be inaccessible to it.

Beniamini posted his exploit to the still-private discussion on August 23, and the post went public a week after iOS 11 landed.

“The exploit has been tested against the Wi-Fi firmware as present on iOS 10.2 (14C92), but should work on all versions of iOS up to 10.3.3 (included)” the post states. “However, some symbols might need to be adjusted for different versions of iOS, see 'exploit/symbols.py' for more information.”

Upon successful execution of the exploit, a backdoor is inserted into the firmware, allowing remote read/write commands to be issued to the firmware via crafted action frames (thus allowing easy remote control over the Wi-Fi chip).

After that, it's child's play: “You can interact with the backdoor to gain R/W access to the firmware by calling the "read_dword" and "write_dword" functions, respectively.”

While it's not the same as the bug Beniamini discovered in April, his subsequent work (in a follow-up also written in April) warned that system-on-chip processors in smartphones are a huge and unaudited attack surface. ®

Send us news
34 Comments

Google will delete data collected from 'private' browsing

Declares victory in settlement of class action lawsuit, but individual claims remain possible

Google One VPN axed for everyone but Pixel loyalists ... for now

Another one bytes the dust

Google location tracking deal could be derailed by politics

$62 million settlement plan challenged over payments to progressive nonprofits

Google joins the custom server CPU crowd with Arm-based Axion chips

Neoverse V2 cores available in GCP later this year

Google sues app devs, claims they're Play Store crypto scammers with 100k+ victims

The pair allegedly made 87 apps since 2019 and defrauded folks of tens of thousands of dollars

Japan turns up heat on Apple, Google with threat of hefty fines

Antitrust proposals could stretch to 30% of annual revenues for law-breaking app store monopolies

Google bakes new cookie strategy that will leave crooks with a bad taste

Device Bound Session Credentials said to render cookie theft useless

Google ponders making AI search a premium option

Ad-free search experience might not be on the cards

AI spam is winning the battle against search engine quality

'Not all AI content is spam, but I think right now all spam is AI content'

Microsoft's playdate in Google's Privacy Sandbox gets messy

Targeted ads in Edge may be blocked before they even arrive

Google plunks down $1 billion for extra Japan-US submarine cable

Adds Hawaii stopover for another planned link

Next Vision, or Vision Next? What we really thought about Google and Intel's AI events

We sat through these conferences so you didn't have to