Protecting Wi-Fi chipsets with hardware-based security cores
Embedi security researcher Denis Selianin recently disclosed a slew of major vulnerabilitiesthat impacted one of the most popular Wi-Fi chipsets on the market. According to various media reports, the affected SoC can be found in devices such as the Sony PlayStation 4, Xbox One, Microsoft Surface laptops, Samsung Chromebooks, Samsung Galaxy J1 smartphones and Valve SteamLink cast devices.
As Selianin notes in a detailed blog post, multiple techniques were used to remotely compromise devices packing the chip by exploiting a number of bugs in the SoC. These include closely examining the interaction between the Wi-Fi SoC and driver, firmware analysis, as well as static and dynamic (ThreadX runtime structures recovery & dynamic firmware instrumentation) firmware file analysis. In addition, Selianin hunted for bugs using fuzzing, engaged in basic ThreadX block pool overflow exploitation, exploited AP device driver vulnerabilities and even executed code on SteamLink’s application processor.
To read the full article, click here
Related Semiconductor IP
Related Blogs
- Is Hardware-Based Security The Right Answer to Cloud Security?
- Rambus CryptoManager Root of Trust Cores Certified ASIL-B/D Ready for Enhanced Security in Automotive Applications
- 5 Strategies for Protecting Your Advanced SoC Designs from Security Breaches
- SiFive Upgrades Automotive Security for the RISC-V Ecosystem with New ISO/SAE 21434 Certification
Latest Blogs
- ML-KEM explained: Quantum-safe Key Exchange for secure embedded Hardware
- Rivos Collaborates to Complete Secure Provisioning of Integrated OpenTitan Root of Trust During SoC Production
- From GPUs to Memory Pools: Why AI Needs Compute Express Link (CXL)
- Verification of UALink (UAL) and Ultra Ethernet (UEC) Protocols for Scalable HPC/AI Networks using Synopsys VIP
- Enhancing PCIe6.0 Performance: Flit Sequence Numbers and Selective NAK Explained
