This article is more than 1 year old
'Pork Explosion' flaw splatters Foxconn's Android phones
Full compromise over USB bacon-ed in to smartmobes
Security researcher Jon Sawyer says a limited backdoor has been found in some Foxconn-manufactured Android phones, allowing attackers to root phones they have in hand.
The backdoor is the result if a debugging function left over in Foxconn apps bootloader code which can be exploited by attackers wielding appropriate software.
Sawyer badges the vulnerability a result of "great neglect" by Foxconn. Miscreants who exploit the security blunder will have complete control over the devices having bypassed SELinux Android security controls, and gained access without the need of authentication.
The vulnerability, dubbed "Pork Explosion" (a salvo to over-hyped flaws bearing names, websites, and logos), is most useful to forensics boffins wanting to pull data from the unspecified list of affected handsets in which the low level Foxconn code exists.
It is of no use to the typical remote app VXer.
Sawyer says while InFocus's M810 and Nextbit's Robin phones are affected, with the latter since patched, many devices likely contain the backdoor code.
"'Pork Explosion' allows an attack with physical access to a device to gain a root shell, with SELinux disabled through USB," Sawyer says
"Phone vendors were unaware this backdoor has been placed into their products," Sawyer says.
"Due to the ability to get a root shell on a password protected or encrypted device, Pork Explosion would be of value for forensic data extraction, brute forcing encryption keys, or unlocking the boot loader of a device without resetting user data.
"In short, this is a full compromise over USB, which requires no logon access to the device."
Sawyer says he contacted Nextbit and Google's Android Security team in August to alert them to the vulnerability and to ask them to pass the details onto the notoriously difficult to reach Foxconn. Nextbit patched the flaws in a little over two months.
Sawyer says it is a complete authentication and authorisation bypass that "isn’t something we should see in modern devices". Attackers can exploit the hole on phones using fastboot and bootloader, or through ADB on a computer. ®