论文标题

科学怪人:高级无线模糊以利用新的蓝牙升级目标

Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets

论文作者

Ruge, Jan, Classen, Jiska, Gringoli, Francesco, Hollick, Matthias

论文摘要

无线通信标准和实现在安全性方面存在困难的历史记录。由于大多数实施和企业焊接都是封闭的,因此模糊仍然是揭示部署系统中远程代码执行(RCE)漏洞的主要方法之一。通用的无线模糊遭受了几个缺点,例如速度有限,可重复性有限和调试能力受限。在本文中,我们介绍了基于先进固件仿真的模糊框架弗兰肯斯坦(Frankenstein),它解决了这些缺点。科学怪人将固件转储“重新栩栩如生”,并为芯片的虚拟调制解调器提供了模糊的输入。我们的新模糊方法的加快足以维持与附加操作系统的互操作性,因此触发了现实的全栈行为。我们通过在Broadcom和Cypress Bluetooth堆栈中找到三个零单击的漏洞来证明科学怪人的潜力,该漏洞用于大多数Apple设备,许多三星智能手机,Raspberry Pis等。 鉴于蓝牙芯片上的RCE,攻击者可能会将其特权升级到芯片边界之外。我们发现了Wi-Fi/蓝牙共存问题,该问题崩溃了多个操作系统内核和蓝牙5.2规范中的设计缺陷,该规范允许从主机中链接键提取。关闭蓝牙不会完全禁用芯片,因此很难防御RCE攻击。此外,在测试这些设备上的基于芯片的漏洞时,我们发现蓝扇(bluefrag)是与芯片无关的Android RCE。

Wireless communication standards and implementations have a troubled history regarding security. Since most implementations and firmwares are closed-source, fuzzing remains one of the main methods to uncover Remote Code Execution (RCE) vulnerabilities in deployed systems. Generic over-the-air fuzzing suffers from several shortcomings, such as constrained speed, limited repeatability, and restricted ability to debug. In this paper, we present Frankenstein, a fuzzing framework based on advanced firmware emulation, which addresses these shortcomings. Frankenstein brings firmware dumps "back to life", and provides fuzzed input to the chip's virtual modem. The speed-up of our new fuzzing method is sufficient to maintain interoperability with the attached operating system, hence triggering realistic full-stack behavior. We demonstrate the potential of Frankenstein by finding three zero-click vulnerabilities in the Broadcom and Cypress Bluetooth stack, which is used in most Apple devices, many Samsung smartphones, the Raspberry Pis, and many others. Given RCE on a Bluetooth chip, attackers may escalate their privileges beyond the chip's boundary. We uncover a Wi-Fi/Bluetooth coexistence issue that crashes multiple operating system kernels and a design flaw in the Bluetooth 5.2 specification that allows link key extraction from the host. Turning off Bluetooth will not fully disable the chip, making it hard to defend against RCE attacks. Moreover, when testing our chip-based vulnerabilities on those devices, we find BlueFrag, a chip-independent Android RCE.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源