from Hacker News

Private Key Extraction from Qualcomm Hardware-Backed Keystores

by griffinmb on 4/24/19, 1:59 PM with 56 comments

  • by AdmiralAsshat on 4/24/19, 3:24 PM

    https://www.qualcomm.com/company/product-security/bulletins#...

    That's pretty much all the snapdragons in modern Android phones (page is not letting me copy+paste them here).

    Has QC put out a patch yet?

    EDIT: The April security patch looks like it took care of it:

    https://source.android.com/security/bulletin/2019-04-01

    EDIT 2: And of course, my Samsung Galaxy S8+, despite having received an update in April, is only at the March 1st security patch level. So I'm likely vulnerable until Samsung's next update.

  • by dlgeek on 4/24/19, 2:49 PM

    Not the best response from the vendor:

    > March 19, 2018: Contact Qualcomm Product Security with issue; receive confirmation of receipt

    > April, 2018: Request update on analysis of issue

    > May, 2018: Qualcomm confirms the issue and begins working on a fix

  • by ndiscussion on 4/24/19, 5:53 PM

    Does this allow someone to decrypt a stolen device?

    I moved from an iPhone to a Galaxy S9 about a year ago because I was getting fed up with Apple's hardware problems, and wanted try Android again.

    I convinced myself that I was able to secure the Android phone as long as I always bought the newest one and kept it up to date.

    But decryption after loss is an untenable scenario for me. I had read that qualcomm's trustzone has had software exploits in the past, but I didn't think it would happen again.

    Is there any way to trust that the data on my Android device is safe? If I lost it today, someone could keep it around for a while until the next exploit drops. Has Apple ever had an exploit of this nature?

  • by Sahhaese on 4/24/19, 3:15 PM

    Possibly stupid question: If only a few bits of nonce are needed to recover the key, what's preventing iteration of all possible values of those "few bits"?
  • by wemdyjreichert on 4/24/19, 3:33 PM

    Could this allow bootloader unlocking, custom roms, etc. on an otherwise locked device (e.g. S7)? Tried the engineering bootloader, but horrible battery management.

    I'll avoid updating until I know more.

  • by bubblethink on 4/24/19, 5:57 PM

    >We demonstrate this by extracting an ECDSA P-256 private key from the hardware-backed keystore on the Nexus 5X.

    Did the fixes make it to nexus 5x ? It has been EOL since December 2018. The cve date is CVE-2018-11976 though.

  • by nayuki on 4/24/19, 2:47 PM

  • by fulafel on 4/24/19, 4:31 PM

    Are there any interesting practical consequences from this in common apps?
  • by VeninVidiaVicii on 4/24/19, 6:05 PM

    Considering how some carriers refuse to unlock bootloaders, this may well be the only option some of us have to restore bricked phones. Other than paying Google 250 bucks to reflash them.