- German srlabs has published an update to their IMSI catcher app called snoopsnitch, which can be used to verify the patch level regarding the official patch errata.
Article on wired:
https://www.wired.com/story/android-...ates-from-you/
App itself:
https://play.google.com/store/apps/d...bs.snoopsnitch
Motion is reporting:
Patched: 142
Not patched: 2 (cve-2017-0784 & cve-2017-5056)
After claimed patched level: 0
Test inconclusive: 53
Not affected: 0gizmo21 likes this.04-12-18 03:18 PMLike 1 - BlackBerry powered by Android Security Bulletin – September 2017 -- BB specifically mentioned patching CVE-2017-0784 in September, hmm...04-12-18 03:34 PMLike 0
- German srlabs has published an update to their IMSI catcher app called snoopsnitch, which can be used to verify the patch level regarding the official patch errata.
Article on wired:
https://www.wired.com/story/android-...ates-from-you/
App itself:
https://play.google.com/store/apps/d...bs.snoopsnitch
Motion is reporting:
Patched: 142
Not patched: 2 (cve-2017-0784 & cve-2017-5056)
After claimed patched level: 0
Test inconclusive: 53
Not affected: 0
https://r.tapatalk.com/shareLink?url...2&share_type=t04-12-18 03:36 PMLike 0 - BlackBerry powered by Android Security Bulletin – September 2017 -- BB specifically mentioned patching CVE-2017-0784 in September, hmm...04-12-18 03:37 PMLike 0
- BlackBerry powered by Android Security Bulletin – September 2017 -- BB specifically mentioned patching CVE-2017-0784 in September, hmm...
Sorry for double post04-12-18 03:42 PMLike 0 -
One of the 'missing' is for fingerprint, and this should DEFINITELY have been under "Not affected" - so take the output with a pinch of salt...04-13-18 08:40 PMLike 0 - All in all this is really disapointing, that manufacturers are even allowed to claim a device fully patched even if it isn't.
What is the delaying on monthly security-patches, if they can just pretent to patch to the correct level
Hey @Bla1ze how about getting some inside information if TCL is really "Blackberry powered by Android" or only Alcatel and getting an article on main-page about it?Last edited by gizmo21; 04-14-18 at 07:34 AM.
anon(2695703) likes this.04-14-18 07:22 AMLike 1 - All in all this is really disapointing, that manufacturers are even allowed to claim a device fully patched even if it isn't.
What is the delaying on monthly security-patches, if they can just pretent to patch to the correct level
Hey @Bla1ze how about getting some inside information if TCL is really "Blackberry powered by Android" or only Alcatel and getting an article on main-page about it?
I found an easy to spot bug in the output in seconds, so why should the rest be flawless?04-14-18 08:32 AMLike 0 -
https://conference.hitb.org/hitbsecc...evel-analysis/04-14-18 01:23 PMLike 0 - Well that is why some infos from the source (TCL or BlackBerry) would be welcome. Perhaps they left some out on purpose, but without any verifiable statement I always believe independent security researchers that put in 2 years for that:
https://conference.hitb.org/hitbsecc...evel-analysis/EskeRahn likes this.04-14-18 01:25 PMLike 1 -
"I feel like Jerry's piece doesn't address this issue. That original article was about OEMs falsify the accuracy of the current security level, not whether the device was still reasonably secure. It's the lying about what the security patch level is currently installed on the device that's the issue."
As much as the true impact of OEMs leaving updates out is unknown, since the fix is in the OS, applying some snake oil like Lookout or Norton or DTEK won't address the issue, even if SRLabs were in the business of selling it. OEMs must either pull up the slack with regards to updates (Chinese OEMs especially) or clarify false positive/negative results.04-14-18 01:55 PMLike 0 - From the comments:
"I feel like Jerry's piece doesn't address this issue. That original article was about OEMs falsify the accuracy of the current security level, not whether the device was still reasonably secure. It's the lying about what the security patch level is currently installed on the device that's the issue."
As much as the true impact of OEMs leaving updates out is unknown, since the fix is in the OS, applying some snake oil like Lookout or Norton or DTEK won't address the issue, even if SRLabs were in the business of selling it. OEMs must either pull up the slack with regards to updates (Chinese OEMs especially) or clarify false positive/negative results.
I still don't know if the tests are 100% accurate, or whether it was an actual vulnerability that had already been addressed on BlackBerry Android, or whether they were actually patched in a non-expected way. This speaks to methodology and the need for corroboration of the technique.
But I do agree that it doesn't really speak to whether or not the missing 2 of 200 patches is meaningful from an overall security standpoint.
And, even if confirmed, do those 2 "missing" patches imply an oversight, an error, or an outright deception.Last edited by conite; 04-14-18 at 02:13 PM.
04-14-18 02:02 PMLike 0 - ...argues "DMP89145". ¯\_(ツ)_/¯
I still don't know if the tests are 100% accurate, or whether it was an actual vulnerability that had already been addressed on BlackBerry Android, or whether they were actually patched in a non-expected way. This speaks to methodology and the need for corroboration of the technique.
But I do agree that it doesn't really speak to whether or not the missing 2 of 200 patches is meaningful from an overall security standpoint.
And, even if confirmed, do those 2 "missing" patches imply an oversight, an error, or an outright deception.
And if we should look very strict on their output we do know that the tests are NOT 100% accurate, since it claims that the Priv ought to have a Fingerprint patch. So their credibility is dubious. And someone with suitable knowledge would need to check what the other claimed 'missing' patches is actually all about, and as you said whether they could be part of later patches. (or also are NA)
I'm NOT saying that I know if they are right or wrong, but we need credible evidences before claiming that BB or any other companies are cheating based on this. For all we know SnoopSnitch could just be flawed test-software.Last edited by EskeRahn; 04-14-18 at 05:37 PM.
04-14-18 04:44 PMLike 0 - First of all I can't see them selling something to the enduser so far, dispite that free app.
Secondly they don't claim to be perfectly analysing that level as they can only do a binary analysis by comparing instead of having sourcecode. That's the whole point of their analysis:
"Apply binary-only patch heuristics"
Thridly they also clearly state that having not found patch signature doesn't mean it is not mitigated otherwise or it is a false positive:
"* Vendor created alternative patch
* Vulnerability requires a specific configuration
* Bug is simply not exploitable
* Errors in our heuristic (it happens!) "
Then they clearly state that a missing patch doesn't mean your vulnarable:
"– A missing patch does not automatically indicate that a related vulnerability can be exploited"
"Owing to this complexity, a few missing patches are usually not enough for a hacker to remotely compromise an Android device. Instead, multiple bugs need to be chained together for a successful hack."
"§ Also found Android exploitation to be unexpectedly difficult"
And at last they updated their table from the presentation slide on their website and https://srlabs.de/bites/android_patch_gap/ now list devices from BlackBerry separately from TCL and they seem not to be that bad as TCL:
But it is still unclear wether e.g. KEYᵒⁿᵉ is a BlackBerry or TCL in their report.
All in all a statement from BlackBerry / TCL would still be welcome.
---
Can't link image inline with mobile browser atm and CB-App crashesLast edited by gizmo21; 06-06-18 at 03:35 PM.
EskeRahn likes this.04-15-18 12:49 AMLike 1 - First of all I can't see them selling something to the enduser so far, dispite that free app.
Secondly they don't claim to be perfectly analysing that level as they can only do a binary analysis by comparing instead of having sourcecode. That's the whole point of their analysis:
"Apply binary-only patch heuristics"
Thridly they also clearly state that having not found patch signature doesn't mean it is not mitigated otherwise or it is a false positive:
"* Vendor created alternative patch
* Vulnerability requires a specific configuration
* Bug is simply not exploitable
* Errors in our heuristic (it happens!) "
.
.
The problem is that people might draw too hasty conclusions from the number of 'missing' patches. Maybe they would cause less confusion if they called the category "Not found" rather than "Missing"
We should also remember that they for a very large part (over 25%) does not say anything either way, so these could be either patched or not.Last edited by EskeRahn; 04-15-18 at 04:57 AM.
04-15-18 04:45 AMLike 0 - I feel that it would make a difference TCL / BlackBerry Mobile and BlackBerry are willing to clarify the results with a statement. When you use security as one your main USP's you should act when that security is in doubt or being questioned.04-15-18 05:11 AMLike 2
-
Think of e.g. sex scandals of current and earlier US presidents "I did not have sexual relations with that woman"... or04-15-18 06:36 AMLike 0 - Well, I guess that this is not very difficult to prove with some backup files. So the statement could be that the missing patches were solved otherwise, and that testing the patch files should prove that, or whatever way they can think of.04-15-18 06:47 AMLike 0
-
On the other hand it is almost impossible to prove that anyone is always honest.
...That is what fuels any conspiracy theory.
It is a similar to a circular argument. We need to believe the proof they put forward, or believe who ever tests what they do put forward for testing....
But sure they could go open source, but I doubt they will be willing to do that - even for a retired product like the Priv, as it may still have elements in common with current models and/or use software technology they sell in other products..04-15-18 07:01 AMLike 0 - Maybe we should turn this thing up side down!
What about a competition with a prize for each claimed patch for the first person that was able to exploit the vulnerability in question?
(The competition could be limited to devices freshly applied with newest Autoloader)
Maybe Crackberry, Blackberry or TCL would be willing to potentially donate current BB devices of the winners choice? If they have patched as they say, they would run no risk!
OR we could all chip in to a crowdfunded prize-pool for this purpose. I would gladly give $10 to that.
A good place to start for any hacker would be those that SnoopSnitch claims are not patched, or those where they are inconclusive.04-15-18 07:22 AMLike 0 - First of all I can't see them selling something to the enduser so far, dispite that free app.
Secondly they don't claim to be perfectly analysing that level as they can only do a binary analysis by comparing instead of having sourcecode. That's the whole point of their analysis:
"Apply binary-only patch heuristics"
Thridly they also clearly state that having not found patch signature doesn't mean it is not mitigated otherwise or it is a false positive:
"* Vendor created alternative patch
* Vulnerability requires a specific configuration
* Bug is simply not exploitable
* Errors in our heuristic (it happens!) "
Then they clearly state that a missing patch doesn't mean your vulnarable:
"– A missing patch does not automatically indicate that a related vulnerability can be exploited"
"Owing to this complexity, a few missing patches are usually not enough for a hacker to remotely compromise an Android device. Instead, multiple bugs need to be chained together for a successful hack."
"§ Also found Android exploitation to be unexpectedly difficult"
And at last they updated their table from the presentation slide on their website andhttps://srlabs.de/bites/android_patch_gap/ now list devices from BlackBerry separately from TCL and they seem not to be that bad as TCL:
https://forums.crackberry.com/attach...y_vendor-1.png
But it is still unclear wether e.g. KEYᵒⁿᵉ is a BlackBerry or TCL in their report.
All in all a statement from BlackBerry / TCL would still be welcome.
---
Can't link image inline with mobile browser atm and CB-App crashesgizmo21 likes this.04-15-18 07:49 AMLike 1 - Everyone here should already know that BlackBerry Android phones don't need updates anyway.
Thurber: "...we believe our phones are inherently more secure..."
http://blogs.blackberry.com/2017/12/...nthly-updates/
Why all this distrust? Lol.04-15-18 08:22 AMLike 2 - I will liken device security to living in glass houses, but the glass should be bulletproof. (From the OS perspective... not from the user data, obviously)
I think there would be more trust in security patching if distribution of said patches was less fragmented.
Not a fan of Apple in general and certainly not claiming that the iOS ecosystem is without fault, but Apple does do some things that help us trust what they've done. For example:
- clearly spelling out what CVE patches are included on their security content page.
- not creating fragmented operating system versions.
Some may argue regarding fragmented OS's, but my point is that iOS 11.1 looks and functions the same, regardless of hardware model and carrier. Meanwhile, we have seemingly a nonsensical mishmash of AAT123 ASQ298 etc etc etc. Having a numbering system where bigger (theoretically) means better security is simple and easy to follow. (Let's avoid batterygate, and POWERD implications for now...)
The treatment of PRIV has not helped build credibility. Yes, there is a recent patch. Supposedly, it mitigates Meltdown/Spectre. Or does it? We honestly don't know. The powers that be haven't told us. We're guessing, because those are the only recent publicly announced vulnerabilities that could prompt BB/TCL to get its OS dev team to work on a device they stopped committing resources to.
Without looking at source code, what can we do to ensure our devices are up to date and secure? In the end, I agree that BlackBerry Mobile needs to be more transparent.Last edited by jadias; 04-19-18 at 12:12 AM.
04-19-18 12:00 AMLike 0
- Forum
- Android BlackBerry Phones & OS
- BlackBerry Android OS
Verifying patch level with SnoopSnitch
Similar Threads
-
Wifi issues after March Patch(UK unit)
By dlochab in forum BlackBerry MotionReplies: 39Last Post: 05-16-18, 08:19 AM -
How do i fall in love with KeyOne Again
By Mazz Ali in forum BlackBerry Android OSReplies: 3Last Post: 04-17-18, 04:28 PM -
KEYone rocks for playing games with mapped keys
By Blemurdefender in forum BlackBerry KEYoneReplies: 1Last Post: 04-12-18, 01:08 PM -
Major problem with my blackberry leap
By Blackberry Leap in forum Ask a QuestionReplies: 6Last Post: 04-11-18, 12:14 PM
LINK TO POST COPIED TO CLIPBOARD