6/14/2023 0 Comments Exploit qualcomm bootloaderRosenberg also notes in a written report about the exploit that many more devices may have been patched by now through software updates. According to Rosenberg, this vulnerability exists in “all known Android devices that support TrustZone and utilize a Qualcomm Snapdragon SoC.” Well, except for the Galaxy S5 and HTC One (M8), both of which have been patched. The security vulnerability was discovered in ARM’s TrustZone, which Qualcomm uses as a “system-wide approach to security” on devices using its Snapdragon processors. His talk happened last night, and according to those at the conference, he successfully unlocked the bootloader of the Moto X on stage. When Rosenberg ( first popped up on the list of Blackhat conference speakers with a topic that was to conclude by discussing an unpublished security exploit “including a live demonstration of using it to permanently unlock the bootloader of a major Android phone,” we were certainly interested. You may recall his previous work that unlocked the bootloader of a number of Motorola DROID devices, something that developers had attempted for years to try and accomplish without success. The Blackhat 2014 conference is taking place this week in Las Vegas, a conference which Dan Rosenberg, the man responsible for exposing numerous security exploits on Android devices, is speaking at.
0 Comments
Leave a Reply. |