Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Android Google

A Simple Android Lock Screen Bypass Bug Landed a Researcher $70,000 (techcrunch.com) 20

Google has paid out $70,000 to a security researcher for privately reporting an "accidental" security bug that allowed anyone to unlock Google Pixel phones without knowing its passcode. From a report: The lock screen bypass bug, tracked as CVE-2022-20465, is described as a local escalation of privilege bug because it allows someone, with the device in their hand, to access the device's data without having to enter the lock screen's passcode. Hungary-based researcher David Schutz said the bug was remarkably simple to exploit but took Google about five months to fix.

Schutz discovered anyone with physical access to a Google Pixel phone could swap in their own SIM card and enter its preset recovery code to bypass the Android's operating system's lock screen protections. In a blog post about the bug, published now that the bug is fixed, Schutz described how he found the bug accidentally, and reported it to Google's Android team.

This discussion has been archived. No new comments can be posted.

A Simple Android Lock Screen Bypass Bug Landed a Researcher $70,000

Comments Filter:
  • by BardBollocks ( 1231500 ) on Monday November 14, 2022 @05:00PM (#63051315)

    ..is to have someone claim money when they get discovered.

  • Is there a way to know what other Android devices this might work on? I have a friend who got locked out of their phone (LG Premier Pro (Model LML414DL)) and this sounds like something that might let them break into their own phone.
    • Re: (Score:2, Insightful)

      by Anonymous Coward

      ^^ found the cop!

  • by hdyoung ( 5182939 ) on Monday November 14, 2022 @06:05PM (#63051457)
    10 times that. The effect on Google’s bottom line wouldnt even show up as pocket change, and they might actually make progress on security.

    It’s almost like they are carefully managing the pace of bug reporting and they don’t really want outside help all THAT much. I suspect these bounty programs are mostly for PR purposes.
  • ... or were those 5 months just the period Google was paid for (>>70k) by unofficial customers who are interested in compromising devices?
    Given how much money governments and agencies of all kinds spend on zero-day exploits, it seems like a good investment to pay significant bug-bounties as long as those payments keep your exploits valuable.
  • by bill_mcgonigle ( 4333 ) * on Monday November 14, 2022 @08:14PM (#63051739) Homepage Journal

    Thanks, David, for exposing an "accidental" backdoor and forcing it to be closed.

    It would be great to see the diff on this one.

  • I had a Nexus 6 up until a year ago. It is a tank but wasn't patched since 2017. I'm assuming it would have been vulnerable.

  • Sorry, for all the marketing hype about Titan Chip this or whatever, this is such an obvious workaround that I refuse to believe an intelligent security researcher with intimate knowledge of the workings of the OS couldn't have thought of this. And supposedly Google employs lots of them. It's right up there with Apple phones getting hacked by sending a single message. Really? Such a simple fucking protocol and you didn't think to proactively sanitize and bounds check everything in advance before careless
    • Re: (Score:2, Insightful)

      by Arethan ( 223197 )

      Such a simple fucking protocol and you didn't think to proactively sanitize and bounds check everything in advance before carelessly tossing it back to privileged libraries to choke on?

      1. It's less simple that you suggest.
      2. Never trust data that you don't directly control. Ever. Even (and perhaps especially) when it comes from other code within your very own company.

      So, you're not wrong, but you're being an ass.

      • when one security researcher can uncover a half dozen vulnerabilities it's clear your half-trillion dollar company isn't paying much more than cursory interest in security. https://www.wired.com/story/im... [wired.com]

        Lest you forget, there are real-world implications for this carelessness. Authoritarian governments count on lax security so they can figure out who to jail and torture.
    • by DarkOx ( 621550 )

      Myopia is a big problem with security testing in general.

      The industry loves black box testing because its cheaper (does not require nearly as many hours). Its lower risk you are not passing out your secret sauce to as many third parties. Finally cynically it finds fewer problems.

      If you hand someone a device like a locked phone and say "see what you can do get into this, without resorting to anything destructive, you have two weeks" are they going to go and get a bunch of activated SIMs and swapping things a

  • I never set a password on my lock screen!

  • by ElizabethGreene ( 1185405 ) on Tuesday November 15, 2022 @12:15AM (#63052119)

    I thought that the device was encrypted and entering the PIN provided the secret required for decryption. e.g. The SIM PIN shouldn't be enough information to decrypt the storage. Is that not how this is supposed to work on mobile devices?

    • On iOS devices, you have a 256 bit code inside the cpu that cannot be read, a 256 bit code stored permanently (this doesnâ(TM)t provide more security but provides instant wipe), and your passcode. Most data and software is encrypted using all three inputs.

      Some things donâ(TM)t need the passcode. Obviously the software allowing you to enter the passcode. Making emergency calls. Taking photos. Alarm clock ringing. Itâ(TM)s up to the developer to decide whether their software or stored data n
  • Among the advantages of using the eSIM card https://esimanywhere.com/ [esimanywhere.com] in a cell phone is the availability of the network, a system that consists in requesting a connection by simply calling the telephone operator without having to buy a SIM card. This is advantageous for people who constantly travel from one country to another.

Real Programmers don't write in PL/I. PL/I is for programmers who can't decide whether to write in COBOL or FORTRAN.

Working...