Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

The second operating system hiding in every mobile phone
OS News ^ | 11/12/2013 | Thom Holwerda

Posted on 11/13/2013 7:00:33 PM PST by markomalley

I've always known this, and I'm sure most of you do too, but we never really talk about it. Every smartphone or other device with mobile communications capability (e.g. 3G or LTE) actually runs not one, but two operating systems. Aside from the operating system that we as end-users see (Android, iOS, PalmOS), it also runs a small operating system that manages everything related to radio. Since this functionality is highly timing-dependent, a real-time operating system is required.

This operating system is stored in firmware, and runs on the baseband processor. As far as I know, this baseband RTOS is always entirely proprietary. For instance, the RTOS inside Qualcomm baseband processors (in this specific case, the MSM6280) is called AMSS, built upon their own proprietary REX kernel, and is made up of 69 concurrent tasks, handling everything from USB to GPS. It runs on an ARMv5 processor.

The problem here is clear: these baseband processors and the proprietary, closed software they run are poorly understood, as there's no proper peer review. This is actually kind of weird, considering just how important these little bits of software are to the functioning of a modern communication device. You may think these baseband RTOS' are safe and secure, but that's not exactly the case. You may have the most secure mobile operating system in the world, but you're still running a second operating system that is poorly understood, poorly documented, proprietary, and all you have to go on are Qualcomm's Infineon's, and others' blue eyes.

The insecurity of baseband software is not by error; it's by design. The standards that govern how these baseband processors and radios work were designed in the '80s, ending up with a complicated codebase written in the '90s - complete with a '90s attitude towards security. For instance, there is barely any exploit mitigation, so exploits are free to run amok. What makes it even worse, is that every baseband processor inherently trusts whatever data it receives from a base station (e.g. in a cell tower). Nothing is checked, everything is automatically trusted. Lastly, the baseband processor is usually the master processor, whereas the application processor (which runs the mobile operating system) is the slave.

So, we have a complete operating system, running on an ARM processor, without any exploit mitigation (or only very little of it), which automatically trusts every instruction, piece of code, or data it receives from the base station you're connected to. What could possibly go wrong?

With this in mind, security researcher Ralf-Philipp Weinmann of the University of Luxembourg set out to reverse engineer the baseband processor software of both Qualcomm and Infineon, and he easily spotted loads and loads of bugs, scattered all over the place, each and every one of which could lead to exploits - crashing the device, and even allowing the attacker to remotely execute code. Remember: all over the air. One of the exploits he found required nothing more but a 73 byte message to get remote code execution. Over the air.

You can do some crazy things with these exploits. For instance, you can turn on auto-answer, using the Hayes command set. This is a command language for modems designed in 1981, and it still works on modern baseband processors found in smartphones today (!). The auto-answer can be made silent and invisible, too.

While we can sort-of assume that the base stations in cell towers operated by large carriers are "safe", the fact of the matter is that base stations are becoming a lot cheaper, and are being sold on eBay - and there are even open source base station software packages. Such base stations can be used to target phones. Put a compromised base station in a crowded area - or even a financial district or some other sensitive area - and you can remotely turn on microphones, cameras, place rootkits, place calls/send SMS messages to expensive numbers, and so on. Yes, you can even brick phones permanently.

This is a pretty serious issue, but one that you rarely hear about. This is such low-level, complex software that I would guess very few people in the world actually understand everything that's going on here.

That complexity is exactly one of the reasons why it's not easy to write your own baseband implementation. The list of standards that describe just GSM is unimaginably long - and that's only GSM. Now you need to add UMTS, HSDPA, and so on, and so forth. And, of course, everything is covered by a ridiculously complex set of patents. To top it all off, communication authorities require baseband software to be certified.

Add all this up, and it's easy to see why every cellphone manufacturer just opts for an off-the-shelf baseband processor and associated software. This does mean that each and every feature and smartphone has a piece of software that always runs (when the device is on), but that is essentially a black box. Whenever someone does dive into baseband software, many bugs and issues are found, which raises the question just how long this rather dubious situation can continue.

It's kind of a sobering thought that mobile communications, the cornerstone of the modern world in both developed and developing regions, pivots around software that is of dubious quality, poorly understood, entirely proprietary, and wholly insecure by design.


TOPICS: Computers/Internet
KEYWORDS:
Navigation: use the links below to view more comments.
first 1-2021-4041-48 next last
You can do some crazy things with these exploits. For instance, you can turn on auto-answer, using the Hayes command set. This is a command language for modems designed in 1981, and it still works on modern baseband processors found in smartphones today (!). The auto-answer can be made silent and invisible, too.


1 posted on 11/13/2013 7:00:33 PM PST by markomalley
[ Post Reply | Private Reply | View Replies]

To: markomalley

What phone?


2 posted on 11/13/2013 7:04:28 PM PST by Paladin2
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Can some translate this all to Stupid?


3 posted on 11/13/2013 7:07:03 PM PST by GeronL
[ Post Reply | Private Reply | To 1 | View Replies]

To: markomalley

Cell phones don’t work here. I have had a couple of people break down near my house and have to use my land line phone because their cells would not work.

I have also gone to neighbors to report my phone out and they told me their phones did not work in this area.

I suppose there are satellite phones and guess they would work but don’t really know anything about them.


4 posted on 11/13/2013 7:10:43 PM PST by yarddog (Romans 8: verses 38 and 39. "For I am persuaded".)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GeronL
They asked for a latte, they got a de-caf.

/johnny

5 posted on 11/13/2013 7:12:39 PM PST by JRandomFreeper (Gone Galt)
[ Post Reply | Private Reply | To 3 | View Replies]

To: GeronL

That would be ... challenging, and probably require a lot of typing. Suffice to say that smart phones are pretty pictures on top of some really old, really crappy code that way too many people have had their fingers in, and it’s frankly a miracle that it still works. Every phone is like this.

This old code is as secure as running Windows 3.1 with no virus protection, we’re just lucky no one has decided to cause problems because they could break a lot of phones with relatively little effort.

I’m surprised no one has done it yet.


6 posted on 11/13/2013 7:15:30 PM PST by TheZMan (Buy more ammo.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: GeronL

Each smartphone has two operating systems. The first is the modern, pretty one you see. The second is the old one that operates the radio system that communicates with the tower. It was written in the 80’s.

The radio system is not secure. These guys have figured out they can do things like have the phone silently turn on and transmit. Think what sounds you could pick up with that.

The radio operating system sucks and it needs to be updated.


7 posted on 11/13/2013 7:18:33 PM PST by Vermont Lt ( 1-800-318-2596, Mr President.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: markomalley

I used to work at Motorola, where we built modems. I used to know most all of the Hayes command set by heart. Tested tens of thousands of modems.

ATDT15552368


8 posted on 11/13/2013 7:31:07 PM PST by Bryan24 (When in doubt, move to the right..........)
[ Post Reply | Private Reply | To 1 | View Replies]

To: 2nd amendment mama

Ping!


9 posted on 11/13/2013 7:35:30 PM PST by basil (2ASisters.org)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GeronL

Well, they’re talking about the “phone side” of things, where the phone talks to the tower. Remember Captain Crunch? So named because he used a cereal box prize whistle to break into the “in band signaling” of the pre-80’s phone network. More primitive than that even was “switch hook dialing”. You could emulate dial pulses simply by “flashing” the switch hook. Very easy to do on a wall phone. I had a friend whose mother put a lock on the dial. Hah!

There’s always something!


10 posted on 11/13/2013 7:36:33 PM PST by dr_lew
[ Post Reply | Private Reply | To 3 | View Replies]

To: markomalley; COUNTrecount; Nowhere Man; FightThePower!; C. Edmund Wright; jacob allen; ...

Nut-job Conspiracy Theory Ping!

To get onto The Nut-job Conspiracy Theory Ping List you must threaten to report me to the Mods if I don't add you to the list...

11 posted on 11/13/2013 7:38:03 PM PST by null and void (I'm betting on an Obama Trifecta: A Nobel Peace Prize, an Impeachment, AND a War Crimes Trial...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dr_lew

I guess internet would be tough on a party-line phone


12 posted on 11/13/2013 7:38:22 PM PST by GeronL (Extra Large Cheesy Over-Stuffed Hobbit)
[ Post Reply | Private Reply | To 10 | View Replies]

To: TheZMan
This old code is as secure as running Windows 3.1 with no virus protection, we’re just lucky no one has decided to cause problems because they could break a lot of phones with relatively little effort.

I’m surprised no one has done it yet.

I am wondering now if that is what happened to me about 5 years ago. Kept getting calls from some collection agency on my flip phone asking for a "Bob Jones" who apparently owed money to someone. I kept telling them I wasn't this Bob Jones guy but the calls continued almost everyday for about six months. One day they called and said if I didn't pay up right now my phone would be shut down. I laughed as I hung up on them. The next day my phone quit working. Verizon couldn't figure it out so they gave me a new phone with a different number and no problems since.

13 posted on 11/13/2013 7:43:32 PM PST by Inyo-Mono (NRA)
[ Post Reply | Private Reply | To 6 | View Replies]

To: GeronL
Every phone line is a party line with NSA!

/johnny

14 posted on 11/13/2013 7:44:12 PM PST by JRandomFreeper (Gone Galt)
[ Post Reply | Private Reply | To 12 | View Replies]

To: GeronL

I had almost forgotten about party lines.

Where we lived out in the country a party line was all that was available. Everyone had their own ring. Ours was two short and one long, I think.

Every call rang on every phone so if you wanted to listen in you were alerted, and you even knew who was being called.

I also remember one neighbor who had two teenage daughters and they would sometimes tie up the phone for hours.


15 posted on 11/13/2013 7:44:37 PM PST by yarddog (Romans 8: verses 38 and 39. "For I am persuaded".)
[ Post Reply | Private Reply | To 12 | View Replies]

To: GeronL
I feel a song coming on.
16 posted on 11/13/2013 7:45:44 PM PST by dr_lew
[ Post Reply | Private Reply | To 12 | View Replies]

To: Bryan24

867-5309


17 posted on 11/13/2013 7:50:44 PM PST by Kickass Conservative (Good news, Federal Funding for my Tagline has been restored. Crisis averted.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: JRandomFreeper

lol


18 posted on 11/13/2013 7:51:23 PM PST by GeronL (Extra Large Cheesy Over-Stuffed Hobbit)
[ Post Reply | Private Reply | To 14 | View Replies]

To: GeronL
You don't even have to sign up! Your credit card is billed automatically! Don't ask what it's worth! Call NOW! Or don't, we've got you covered!

Yeah... government is pretty much like that these days. Infomercial hype with a bite in the ass.

/johnny

19 posted on 11/13/2013 7:55:44 PM PST by JRandomFreeper (Gone Galt)
[ Post Reply | Private Reply | To 18 | View Replies]

To: JRandomFreeper

yes it is


20 posted on 11/13/2013 7:58:48 PM PST by GeronL (Extra Large Cheesy Over-Stuffed Hobbit)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-48 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson