Last Updated:


How To
How To Samsung

Vulnerabilities allow access to data in TrustZone and execute arbitrary code.

Specialists of the Russian company Digital Security have discovered vulnerabilities in Samsung smartphones that allow them to gain complete control over the device. The problem affects devices with Qualcomm MSM8896 processors (Snapdragon 820), MSM8898 (Snapdragon 835), as well as Exynos 7420, 7870, 8890 and 8895. These are mainly current and flagship models from different years - Galaxy Note 5 and S6, Galaxy S8 and Note 8 , S7 and Note 7, S8 and Note 8, as well as J6, J7, A2 Core, J5, M10, A6 and A3.

The first of the two problems found is information disclosure vulnerability. With its help, an attacker can gain access to the contents of TrustZone, a hardware-isolated environment completely separate from the device’s operating system.

“Vulnerability in the TEE Gatekeeper trust with a UID of“ 081300000000000000000000000000 ”can be used by the application to read in Normal World memory available only from Secure World in TrustZone terminology. The vulnerability is due to the lack of address checking in the TCI buffer. The attacker gets read access to all the memory available to the trustlet, ”theDigital Security notice says.

The second problem is the heap overflow vulnerability. "Vulnerability in the TRUST_KEYMASTER trustlet with UID" ffffffff0000000000000000000000e "is caused by a heap overflow during parsing of the ASN.1 structure encoded according to the DER rules. Vulnerability leads to the ability of an attacker to execute arbitrary code in the context of TEE (Trusted Execution Environment), ”theresearchers said.

Samsung released patches for both vulnerabilities in May 2019.