» » Critical Vulnerability in Google’s Titan M Chip Earns Researchers $75,000

Critical Vulnerability in Google’s Titan M Chip Earns Researchers $75,000

Critical Vulnerability in Google’s Titan M Chip Earns Researchers $75,000

Residence › Vulnerabilities

Vital Vulnerability in Google’s Titan M Chip Earns Researchers $75,000

By Ionut Arghire on August 16, 2022

Tweet

Safety researchers at Quarkslab have printed detailed info on a important vulnerability they found in Google’s Titan M chip earlier this yr.

Launched in 2018, Titan M is a system-on-a-chip (SoC) designed to ship elevated safety protections to Pixel gadgets, together with guaranteeing safe boot.

Tracked as CVE-2022-20233, the newly detailed vulnerability was addressed as a part of Android’s June 2022 safety patches, when Google described it as a important escalation of privilege bug.

In line with Quarkslab’s researchers – who found the problem and reported it to Google – the safety flaw will be exploited to realize code execution on the Titan M chip.

The vulnerability is an out-of-bounds write subject that exists due to an incorrect bounds test. Exploiting the bug to realize native escalation of privilege doesn’t require consumer interplay.

Quarkslab says that, whereas fuzzing Titan M, they noticed a crash that was occurring when “the firmware was attempting to put in writing 1 byte in an unmapped reminiscence space,” and found that the bug could possibly be triggered a number of instances to realize out-of-bounds writes.

The safety researchers word that the Titan M reminiscence is totally static, however that they needed to immediately connect with the UART console uncovered by Titan M to entry debugging logs and transfer on with constructing an exploit.

Quarkslab’s researchers then created an exploit that allowed them to learn arbitrary reminiscence on the chip, which allowed them to “dump the secrets and techniques saved within the chip (such because the Root of Belief despatched by the Pixel bootloader when the Titan M is up to date)” and even entry the boot ROM.

“One of the vital attention-grabbing penalties of this assault is the flexibility to retrieve any StrongBox protected key, defeating the best degree of safety of the Android Keystore. Equally to what occurs in TrustZone, these keys can solely be used inside Titan M, whereas they’re saved in an encrypted key blob on the system,” Quarkslab explains.

The researchers reported the vulnerability to Google in March. Google launched a patch in June and initially awarded a $10,000 bounty reward for the bug. Nonetheless, after being supplied with an exploit demonstrating code execution and the exfiltration of secrets and techniques, the corporate elevated the payout to $75,000.

Quarkslab’s researchers offered their findings each on the TROOPERS convention in June and at Black Hat USA final week.

Associated: Google Patches Vital Android Vulnerabilities With June 2022 Updates

Associated: Google Providing As much as $1.5 Million for Android 13 Beta Exploits

Associated: Google Paid Out $8.7 Million in Bug Bounty Rewards in 2021

Get the Every day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • The Way forward for CyberSecurity is Prevention
  • Vital Vulnerability in Google’s Titan M Chip Earns Researchers $75,000
  • Ransomware Group Claims Entry to SCADA in Complicated UK Water Firm Hack
  • Sign Discloses Influence From Twilio Hack
  • Zoom Patches Severe macOS App Vulnerabilities Disclosed at DEF CON
  • Cyber Agency Darktrace Shares Surge on Attainable Takeover
  • Three Nigerian BEC Fraudsters Extradited From UK to US
  • Microsoft Publicizes Disruption of Russian Espionage APT
  • Assange Attorneys Sue CIA for Spying on Them
  • Hundreds of VNC Situations Uncovered to Web as Assaults Improve

Searching for Malware in All of the Flawed Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Tips on how to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

Tips on how to Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles