Mobile Threat Catalogue

Vulnerable Isolated Execution Environment Software

Contribute

Threat Category: Isolated Execution Environments

ID: STA-11

Threat Description: Isolated execution environments, such as a Trusted Execution Environment, often run on a dedicated hardware chip. It has access to areas of physical memory that are restricted from the mobile operating system, which are often used to protect high-value cryptographic keys and other secrets. If a vulnerability in either the execution environment’s operating system or a program executing under it is exploited, an attacker may gain access to these keys or be able to obtain the output from sensitive cryptographic operations that require them.

Threat Origin

Extracting Qualcomm’s KeyMaster Keys - Breaking Android Full Disk Encryption 1

Exploit Examples

Not Applicable

CVE Examples

Possible Countermeasures

Mobile Device User

To decrease the latency between availability and installation of security fixes for isolated execution environments, configure devices (potentially using EMM solutions) to automatically install security updates, or at a minimum, provide automated notification to the user that security updates are available for installation.

Enterprise

To decrease the latency between availability and installation of security fixes for isolated execution environments, configure devices (potentially using EMM solutions) to automatically install security updates, or at a minimum, provide automated notification to the user that security updates are available for installation.

To decrease the risk of persistent and unpatched vulnerabilities in isolated execution environments in deployed devices, consider acquiring mobile devices from vendors and carriers with a history of addressing and releasing security updates in a timely fashion.

Original Equipment Manufacturer

Use TEE OS that provide integrity protections over trustlets, such as verification of digital signatures on installed trustlets, such as Trusty OS. 2

References

  1. laginimaineb, “Extracting Qualcomm’s KeyMaster Keys - Breaking Android Full Disk Encryption,” blog, 30 Jun. 2016; https://bits-please.blogspot.com/2016/06/extracting-qualcomms-keymaster-keys.html 

  2. Trusty TEE; https://source.android.com/security/trusty/index.html#third-party_trusty_applications [accessed 8/29/2016]