According to The Register, Samsung shipped '100 million' phones with flawed encryption. Researchers at TelAviv University demonstrated a method that could compromise the hardware security of over 100 million Samsung phones. Android-based Samsung phones had been shipped with design flaws that could allow the extraction of cryptographic keys.
Samsung failed to implement Keymaster TA properly in its Galaxy S8, S9, S10, S20, and S21 phones. The researchers reverse engineered the Keymaster app and showed they could conduct an Initialization Vector (IV) reuse attack to obtain the keys from the hardware-protected key blobs.
The weak crypto was also used by the researchers to bypass FIDO2 WebAuthn, a way to use public-key cryptography, instead of passwords, to register for and authenticate to websites.
Two encryption experts weighed in on this latest news.
Nasser Fattah, North America Steering Committee Chair, Shared Assessments:
“Often it is either an incorrectness with security implementation or misconfiguration that introduces vulnerabilities. Thus, it’s important to have an ongoing verification process, ideally an automated one that continuously checks for the expected security outcome(s), when installing and configuring security controls. Additionally, important to follow best practices, including using the latest commercially acceptable encryption algorithms, when implementing security controls. Anything less presents an opportunity for a bad actor to exploit.”
Damon Ebanks, VP Marketing, Veridium:
“It’s important to understand the gravity of the situation because, if the researchers hadn’t uncovered this, Samsung’s users were facing a severe threat. If successful, malicious actors might gain access to the device's Normal World sector and install malware, as well as grant root rights to any programs. In addition, rather than running malware in the Android kernel, the attacker might just run code in the Android user mode.
“However, it is a piece of good news that Samsung has created a patch for the affected devices and removed a legacy blob from s10, s20, and s21 devices.”