Report Claims 100 Million Samsung Galaxy Phones Shipped With A Fatal Security Flaw

100 million samsung galaxy phones fatal security flaw news
Earlier this month, we reported on a security flaw in Apple iOS devices and Macs, but now it’s Samsung’s turn. Tel-Aviv University researchers have published a paper detailing a major security flaw in Samsung Galaxy phones going back to the Galaxy S9. The researchers estimate that Samsung shipped roughly 100 million devices with this security flaw that could have been exploited to extract hardware-protected cryptographic keys, which protect sensitive user data.

The researchers first discovered the security flaw in the Galaxy S9 and reported the vulnerability to Samsung Mobile Security in May 2021. Samsung responded by issuing a patch in August 2021 that applied not only to the S9, but to a whole list of devices including the Galaxy J3 Top, J7 Top, J7 Duo, TabS4, Tab-A-S-Lite, A6 Plus, and A9S. However, before Samsung released this patch, the researchers reported to Samsung in July 2021 that they had discovered the security flaw again in the Galaxy S10, S20, and S21. Samsung pushed out a patch addressing the vulnerability in these additional devices, as well as all devices running Android Pie or later, in October 2021. Fortunately, these patches mean that users shouldn’t have to worry about attackers exploiting this security flaw, so long as they have kept up with software updates. 

100 million samsung galaxy phones fatal security flaw trustzone news
Diagram of ARM TrustZone software and hardware isolation architecture

Many devices, including Samsung phones, make use of ARM TrustZone, which divides devices into “Normal World” and “Secure World.” Normal World is where the Android operating system resides, while a separate TrustZone Operating System (TZOS) runs in Secure World and handles security-sensitive functions, including encryption.

The researchers discovered a difference in the way encryption is handled in Secure World between the Galaxy S8 and devices that came after. The devices make use of the AES-GCM encryption algorithm, which calls for the use of a Number Used Once (nonce). A nonce introduces random noise during encryption, so that no two files, even if they contain the exact same information, appear the same once encrypted.

However, starting with the Galaxy S9, Samsung’s code did not enforce the nonce requirement and even allowed apps running in Normal World to influence or even choose the nonces used. The researchers were able to reuse the same nonce as many times as they wanted and exploit this capability to extract cryptographic secrets inside Secure World. While the Galaxy S10, S20, and S21 contained different code than the flawed code in the S9, the researchers were able to perform an attack that downgraded these devices to the old security protocol on the S9, introducing the same security flaw found on that device.

You can read the full paper for additional details.
NW

Nathan Wasson

Nathan grew up with computer hardware news and reviews in the family business and eventually joined the business himself in 2014. He initially joined to make video reviews and help with the podcast, but was soon asked if he would write, and he's been writing about computers ever since. More recently, Nathan has developed a passion for internet privacy, security, and decentralization and likes writing about those topics the most. He spends much of his free time tinkering with Linux distributions, custom Android ROMs, privacy and security tools, and self-hosting solutions. He also started gaming on a PC at a young age and still can't give up Unreal Tournament 2004 and Supreme Commander 2. Beyond computers, Nathan is a car enthusiast and philosophy nerd.

You can follow Nathan on Mastodon and Twitter.

Opinions and content posted by HotHardware contributors are their own.