Featured Android vulnerability

Published on November 14th, 2022 📆 | 4907 Views ⚑

0

Cybersecurity researcher discovers a way to bypass lockscreen on Pixel devices


https://www.ispeech.org/text.to.speech

Cybersecurity researcher David Schutz has discovered a serious vulnerability that allows anyone to bypass the lock screen on a Pixel smartphone. According to Schutz, the only thing an attacker needs to bypass the lock screen is a SIM card and access to the device. In his blog post, he adds that the ā€œvulnerability is tracked as CVE-2022-20465 and it might affect other Android vendors as well.ā€ It is not clear if other phone manufacturers are also impacted. Keep in mind that he was only able to create and recreate the flaw on a Pixel device.

ā€œI found a vulnerability affecting seemingly all Google Pixel phones where if you gave me any locked Pixel device, I could give it back to you unlocked,ā€ wrote Schutz in a blog post documenting the vulnerability.

He added that Google has patched the vulnerability in a security update released on November 5, 2022.

Finding something wrong with Android

The discovered the vulnerability when his phone ran out of battery one day. At the time, he connected the deviceā€™s charger and booted up the phone. Once he did this, he was asked to enter the security PIN for the SIM card that was in the phone. Since he didnā€™t remember it correctly at the time, he ended up entering the PIN incorrectly three times.





At this point, the SIM card got locked and Schutz had to enter the SIMā€™s PUK code in order to unlock it. After he entered the PUK code, the phone asked him to enter a new PIN. After he did that, he noticed something peculiar. The phone was displaying the fingerprint icon, which was not supposed to happen.

Usually, after a phone is rebooted, it will not initially accept fingerprint unlocking unless the deviceā€™s pin code or password has been entered at least once. But the phone accepted Schutzā€™s fingerprint, and then it got stuck on a screen until he rebooted it again.

Discovering the vulnerability

He then tried to replicate the process without rebooting the phone. He removed the SIM tray of the phone while it was still switched on and reinserted the tray. He incorrectly entered the PIN three times, then entered the PUK and set a new PIN. At this point, the phone took him to the unlocked home screen, despite the fact that the device was locked before.

Schutz then repeated the process multiple times and got the same result each timeā€”the phone got unlocked despite him not entering the password or using his fingerprint.

According to Schutz, he initially reported the vulnerability to Google in June this year. It has been fixed in a security patch released on November 5.



Source link

Tagged with: ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢ ā€¢



Comments are closed.