Android full disk encryption can be brute-forced on Qualcomm-based devices

Android smartphone makers can help law enforcement break full-disk encryption on Qualcomm-based devices

Attackers can exploit vulnerabilities in Android devices with Qualcomm chipsets in order to extract the encrypted keys that protect users' data and run brute-force attacks against them.

The attack was demonstrated last week by security researcher Gal Beniamini and uses two vulnerabilities patched this year in Qualcomm's implementation of the ARM CPU TrustZone.

The ARM TrustZone is a hardware security module that runs its own kernel and Trusted Execution Environment independent of the main OS. On Qualcomm chips, the Trusted Execution Environment is called QSEE (Qualcomm Secure Execution Environment).

The full-disk encryption feature on Android devices relies on a randomly generated key called the device encryption key (DEK). This key is itself encrypted with another key derived from the user's PIN, password or swipe pattern.

Like iOS, Android attempts to prevent the extraction of the encrypted DEK which could allow attackers to execute brute-force password guessing attacks against it off the device, where there are no protections like software-enforced delays between failed password guesses.

This is done by binding the DEK to the device's hardware through the use of an application called KeyMaster that runs inside the Trusted Execution Environment.

However, Beniamini found that, unlike iOS, which binds the DEK to a hardware-based key called the UID that cannot be extracted by software, Qualcomm's implementation uses a key that is available to the KeyMaster application that runs inside the QSEE.

This means that breaking into QSEE could provide access to the KeyMaster key and allow the extraction of the DEK. Attackers could then run brute-force attacks against it on more powerful equipment such as a server cluster, designed for password cracking.

This reduces the security of Android's full-disk encryption to that of the user password, PIN or swipe pattern. And unfortunately, for usability reasons most users don't set complex access passwords on their mobile devices.

Beniamini's proof-of-concept attack combined a vulnerability patched in Android in January and one patched in May, but in the Android ecosystem many devices don't receive updates in a timely manner, if ever.

Duo Security, a company that provides two-factor authentication solutions for smartphones, has run an analysis on its user base and estimated that over 50 percent of Android devices are vulnerable to Beniamini's attack. That's also because Qualcomm is the market leader for ARM CPUs used in phones and tablets.

And even if the affected devices did receive the necessary Android patches, the problem would not disappear entirely.

"Even on patched devices, if an attacker can obtain the encrypted disk image (e.g. by using forensic tools), they can then 'downgrade' the device to a vulnerable version, extract the key by exploiting TrustZone, and use them to brute-force the encryption," Beniamini said in a blog post.

The deeper issue is that on Qualcomm's implementation, the Android FDE is not directly bound to a unique hardware-based key that only exists on the device and cannot be extracted by software. Instead, it's tied to a key that is accessible to the QSEE software and which could be leaked through future TrustZone vulnerabilities.

"Finding a TrustZone kernel vulnerability or a vulnerability in the KeyMaster trustlet, directly leads to the disclosure of the KeyMaster keys, thus enabling off-device attacks on Android FDE," the researcher concluded.

Furthermore, because Android manufacturers can digitally sign and flash TrustZone images to any device, they can comply with law enforcement requests to break Android full-disk encryption.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?