Long Term Exploitation
“Baseband security? 4Get about it.”
Long Term Exploitation Baseband security? 4Get about it. - - PowerPoint PPT Presentation
Long Term Exploitation Baseband security? 4Get about it. Background: 2G GSM specification started in 1982 Standardized by GSMA First commercial launch 1992 TDMA based, circuit- switched 2.5G: GPRS (packet- switched)
“Baseband security? 4Get about it.”
in 1982
1992
switched
switched) added in 2000
formed, UMTS/WCDMA started in 2000
new Layer 1&2
switched hybrid
Release 8 finalized in 2008
Even calls are over IP (VoLTE)
QoS support
calls
is the currently ongoing release.
2G/3G LTE
GERAN and UTRAN E-UTRAN BTS/BSC (GSM), NB/RNC (UMTS) eNB SGSN/PDSN-FA S-GW GGSN/PDSN-HA PDN-GW HLR/AuC HSS/AuC VLR MME SS7-MAP/RADIUS Diameter GTP v0/v1 GTP v2 MIP PMIP PHY/LAPDm/RR (GSM) PHY/MAC/RLC/RRC (UMTS CP) PHY/MAC/RLC/PDCP (UMTS PS UP) PHY/MAC/RLC/PDCP/RRC MM, CM (CS CP) GMM, SM (PS CP) IP (PS UP) n/a (CS) EMM, ESM (PS) IP (PS UP) Circuit-switched, controlled by Call Control in NAS CM VoIP; CS Fallback* Circuit-switched, controlled by SMS in NAS CM SMS over IP; SG-SMS over NAS* Circuit-switched, conntrolled by Supplementary Services in NAS CM Multimedia Telephony (IP); CS Fallback*
*transition solutions Network Elements Core Network Protocols AS Protocols NAS Protocols Calls SMS
in SIM/AuC
MME
to silently locate, track, and intercept the communications of subscribers.
to this presentation. We put this aside.
Attack Description
Impersonation Stealing subscriber identities aka SIM cloning Eavesdropping Capturing & retrieving plaintext communication Location Tracking Tracking the movement of a subscriber through the
within a location/tracking area. Identification Finding out the identity of a UE (IMEI) or SIM (IMSI) connected to the network. Man-in-the-Middle Actively intercepting/modifying traffic. Baseband Vulnerabilities Exploiting implementation vulnerabilities in Layer2/3 Application Layer Exploitation Exploiting vulnerabilities or insecure features in the application layer (e.g. Binary SMS). Denial-of-Service Attacks that cause permanent or temporary DoS to subscribers. Core Network Attacks* Targeting the core network directly.
*No research was done on core network attacks in LTE, this will not be discussed here.
ways to actually break the crypto, either to recover the K from the SIM, or to break the authentication, encryption or integrity protection.
either.
attacks are thwarted in LTE.
reasons.
without integrity protection
physical or remote attack), AS security is compromised.
and NAS. IFF the network configures EA0, then the data is simply plaintext.
maybe extremely rare.
GSM 02.07. specification, but that specification also allows for the SIM to turn this off.
BCCH (broadcast), PCCH (paging), CCCH (common control), DCCH (dedicated control), DTCH (data traffic), etc.
correlate pages to verify whether a subscriber is present in an area or not.
GUTI, an attack is still plausible, but a lot more difficult.
supported by the UE, all bets are off.
creeped back in (again with the “transition”).
accepted EIA0. Found and disclosed by Benoit Michau (SSTIC 2014).
integrity protection.
security, Relay Node Configuration, SMC
Measurements, DL Information Transfer, Counter Check, Connection Release
the user equipment / baseband version of a subscriber.
identify the type of equipment that a subscriber has.
subscriber.
a more precise location of the UE.
protection.
replay of user plane data results in garbage.
traffic with a compromised femtocell.
that enables user plane message replays.
(sequence number) and the HFN (hyperframe number).
RX and TX.
maintained locally by both the UE and the eNB.
the UE.
by the UE for HFN overflows.
happening, but that assumes a benign use- case.
delivered via System Information messages in the BCCH
sent by a malicious eNB
integrity protection
without valid integrity protection
an EPS security context. This is done via the AKA (Authentication and Agreement).
is established after the AKA via the NAS and AS SMC procedures, respectively.
before the secure exchange of NAS messages is established.
integrity protection, as in certain situations they are sent by the network before security can be activated.”
EPS security context initially is not practical to exploit in most scenarios.
services again, changes eNBs, etc.
state?
user inactivity.
case, terminating the “secure exchange of NAS messages”.
IDLE timers. In practice, this is on the order of seconds.
EMM-IDLE RRC-IDLE EMM-CONNECTED RRC-CONNECTED RRC Connection Establishment RRC Connection Release: secure NAS xchg deactivated
the network when in CONNECTED states.
selection at its own discretion, similar to 2G/3G.
maybe because it receives a paging event.
be re-established.
protected but not ciphered and includes a key identifier (eKSI) with the message.
not consider the security re-established.
exchange of NAS messages re-established only if:
protected NAS response,
Reconfiguration, which re-activates AS security and then the user plane data bearers are re-established.
“secure exchange of NAS messages not established”!
subscriber identity.
not more.
because LTE LPP goes over user plane (SUPL) or NAS.
traffic does not proceed until AS security has been re- activated.
Reject to cause Denial-of-Service.
power-off or USIM removal.
context
messages that will be accepted without integrity protection.
integrity protection, as in certain situations they are sent by the UE before security can be activated. “
and “IMSI Flood”) can be plausible in LTE as well.
downgrade to 2G/3G.
USIM for EPS until power-off or USIM removal.
will trigger the UE to attempt GERAN/UTRAN instead.
protection.
without valid integrity protection.
(Qualcomm Security Summit 2015):
implementation always accepted detach messages without integrity protection, regardless of NAS security state.
questions: @kutyacica
Thank you!
Appendix: History of 2G/3G attacks
generated by the SIM from the key K with an algorithm called COMP128.
1997, broken in 1998. SIM cards based on it could easily be cloned.
session key. COMP128-3 provides the full 64 bits. Both were secret and reverse-engineered.
AES used by USIMs in UMTS/LTE.
the SIM.
OTA updates.
install malicious Java applets on SIM cards.
can be re-used as long as they are valid.
longevity of session keys, this attack may be practical or impractical.
keys, which takes us to …
banned.
were published in 2000 (Biryukov et al, Birham et al).
attack in practice and released pre-computed rainbow tables that enable breaking a session key in seconds.
randomization “patch” for A5/1 exists
be the correct UE.
entire location areas as well!)
IF the network does not authenticate, then calls/SMS can actually be hijacked.
plaintext can be acquired.
issues with operator networks.
in 2012 (reported by Nico Golde).
network operator practices of all three mentioned aspects: impersonation, eavesdropping, identification.
stations.
when capabilities include full MitM.
UMTS) to precisely locate a subscriber.
DefCon18 (2010).
modern phones the mobile OS parses the SMS PDU
demonstrated (DeepSec 2010).
and Qualcomm basebands, but the details were never disclosed.
compromising the baseband from the mobile OS enables “temporary impersonation” by stealing session keys
vulnerabilities (2009)
peak/poke memory (28C3 2011)
Android (HITB 2015)
tracking, since it’s a paging event that the UE silently and automatically responds to.
by the subscriber.
Management) connection. Also not seen by the subscriber.
attacks are feasible without base stations too.
(including source spoofing) were wildly available. Operators typically filter these today.
baseband.
applications (“TAMs”) on some SIMs respond to commands without authentication.
queried for the Kc.
with billions of active SIM cards, even a small percentage is a significant number.
consumed by a dedicated process.
message by connecting to the DM server requested.
connections could be hijacked (reconfigure DNS etc). This was the old days of no authentication, no operator filtering, and the ability to simply send arbitrary SMSes using an Internet service (Black Hat 2009).
implementation can be exploited (Black Hat 2014).
across all devices per Carrier.
implementation of Assisted GPS. Basically, the phone reveals its location to the SUPL server when requested.
is implemented in the mobile OS itself and works over Wifi too.
(Android, Blackberry) configured insecure (HTTP) SUPL servers. He also found vulnerabilities in the SUPL stack of Qualcomm’s baseband. (Black Hat 2012)
sent the IMSI to supl.google.com and it did not validate certificates.
automatically triggered via URI handlers on Samsung devices in order to wipe phones or “kill” SIM cards. (Ekoparty 2012)
also via WAP Push SMS.
fuzzing at DefCon 22 (2014)
Compromise via serial, mods to enable IMSI catching, interception.
2011.
an AT&T 3G Microcell both via serial (root password bruteforce) and the WAN interface (a service allowed unauthenticated command execution as root).
again enabling interception and also cloning.
Hat 2015)
down the entire walled garden. Getting access without being an
31C3, showing that SS7 commands can be abused to:
easily used to consume random access channels and effectively DoS entire location areas remotely (CCS 2005).
RACHs with a flood of requests.
prevent network access to others (Grugq, Black Hat 2010).
to the network in the name of another subscriber cause a temporary DoS to a targeted IMSI.
Location Update Reject message. (Domonkos Tomcsányi, Hacktivity 2014)