What Experts Have To Say On Samsung Shipped 100 Mil+ Phones With Flawed Encryption

The Register is reporting Samsung shipped ‘100 million’ phones with flawed encryption. Researchers at TelAviv University demonstrated a method that could compromise the hardware security of over 100 million Samsung phones. Android-based Samsung phones had been shipped with design flaws that could allow the extraction of cryptographic keys.

… Samsung failed to implement Keymaster TA properly in its Galaxy S8, S9, S10, S20, and S21 phones. The researchers reverse engineered the Keymaster app and showed they could conduct an Initialization Vector (IV) reuse attack to obtain the keys from the hardware-protected key blobs.

The weak crypto was also used by the researchers to bypass FIDO2 WebAuthn, a way to use public-key cryptography, instead of passwords, to register for and authenticate to websites.

Experts Comments

February 28, 2022
Damon Ebanks
VP Marketing
Veridium

It’s important to understand the gravity of the situation because, if the researchers hadn’t uncovered this, Samsung’s users were facing a severe threat. If successful, malicious actors might gain access to the device's Normal World sector and install malware, as well as grant root rights to any programs. In addition, rather than running malware in the Android kernel, the attacker might just run code in the Android user mode.

However, it is a piece of good news that Samsung has created a patch

.....Read More

It’s important to understand the gravity of the situation because, if the researchers hadn’t uncovered this, Samsung’s users were facing a severe threat. If successful, malicious actors might gain access to the device's Normal World sector and install malware, as well as grant root rights to any programs. In addition, rather than running malware in the Android kernel, the attacker might just run code in the Android user mode.

However, it is a piece of good news that Samsung has created a patch for the affected devices and removed a legacy blob from s10, s20, and s21 devices.

  Read Less
February 28, 2022
Nasser Fattah
Executive Advisor
Shared Assessments

Often it is either an incorrectness with security implementation or misconfiguration that introduces vulnerabilities. Thus, it’s important to have an ongoing verification process, ideally an automated one that continuously checks for the expected security outcome(s), when installing and configuring security controls. Additionally, important to follow best practices, including using the latest commercially acceptable encryption algorithms, when implementing security controls. Anything less

.....Read More

Often it is either an incorrectness with security implementation or misconfiguration that introduces vulnerabilities. Thus, it’s important to have an ongoing verification process, ideally an automated one that continuously checks for the expected security outcome(s), when installing and configuring security controls. Additionally, important to follow best practices, including using the latest commercially acceptable encryption algorithms, when implementing security controls. Anything less presents an opportunity for a bad actor to exploit.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.