News

Severe SMS Vulnerability In Nexus Phones Revealed



Details were revealed about a potentially serious SMS vulnerability found in all current Nexus phones at the DefCamp Security Conference in Bucharest, Romania. The person responsible for the discovery is Bogdan Alecu, a system administrator at Levi9 and independent security researcher in Romania. When exploited, the attack can force the phone to reboot or destabilize certain services.

The method of attack simply relies on sending a series of Class 0 “Flash” messages to the target phone. Flash messages are typically used for emergency or security purposes, appearing on the screen immediately instead of going to the default SMS application. When such a message arrives, no sounds are made but the background is dimmed and a single dialog box appears on top. Once 20-30 messages pile up, assuming the user isn’t clearing them, it overloads the system and leads to a few potential side-effects. Most commonly, the result is an unresponsive device or an immediate reboot, but the Messages app or cellular radio may occasionally crash or freeze up in some instances.



In the event that the cellular radio crashes, it may have some more serious consequences. If a target has their SIM locked with a PIN code, the phone will not be able to reconnect until the code is entered. From time to time, it’s also possible for the cellular radio to seize up, which can only be fixed by restarting the device. This is problematic because there are no audible prompts and the malfunction won’t be seen until the owner unlocks their screen, leaving them without service for potentially several hours.

Alecu first notified The Android Security Team to the issue over a year ago, but initially received only automated responses. Continued efforts were mostly unsuccessful, leading to the decision to disclose the vulnerability publicly. To mitigate potential threats, he collaborated with Michael Mueller, a Technical IT-Sec Auditor, to develop Class0Firewall, an app designed to protect the smartphone from Class 0 messages if they reach the threshold of becoming a denial-of-service attack.

Bogdan notes that the current attack is only capable of destabilizing a phone, but theorizes that it might be possible to force remote code execution. Based on limited testing with devices from various vendors, the vulnerability appears to only affect the Nexus line running on all versions of stock Android through to the current release of KitKat. None of the OEM variants checked were susceptible to the attack.

Hopefully the publicity will prompt Google to release a patch to block the issue as quickly as possible. Even if a fix is rolled out, it’s not entirely clear if the Galaxy Nexus will receive it now that it is no longer getting OS updates. A security update should be issues to all Galaxy Nexus device though in oder to patch the severity of this issue.

Thank you Android Police for providing us with this information
Video courtesy of mdforum.ru

Gabriel Roşu

Disqus Comments Loading...

Recent Posts

Jensen Huang to Kick Off Computex 2024 With NVIDIA Keynote

As Computex 2024 approaches, the tech industry buzzes with anticipation for a series of high-profile…

5 hours ago

MSI Prioritizes NVIDIA Over AMD as RX 7000 GPU Supplies Vanish

MSI, a key player in the graphics card market, appears to be shifting its focus…

5 hours ago

TeamGroup Clinches Four Red Dot Awards for Innovative Design

TeamGroup has once again proven its prowess in the field of memory product innovation by…

5 hours ago

eFootball Hits Major Milestone with 750 Million Downloads

Konami's eFootball has reached a staggering 750 million downloads worldwide. This milestone comes as the…

5 hours ago

Manor Lords Is Out Now On Steam, Epic and Gamespass!

Just a few hours after its release on Steam alone Manor Lords has already managed…

22 hours ago

WWE 2K24 PS5 Standard Edition

FORTY YEARS OF WRESTLEMANIA WrestleMania is the biggest event in sports entertainment, where Superstars become…

23 hours ago