Mobile Threat Catalogue

Inadequate Baseband Processor and Application Processor Separation

Contribute

Threat Category: Baseband Subsystem

ID: STA-19

Threat Description: If the baseband and application processor are not adequately separated, an adversary could exploit this to gain access to primary operating system data.

Threat Origin

Not Applicable, See Exploit or CVE Examples

Exploit Examples

Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks 1

CVE Examples

Not Applicable

Possible Countermeasures

Original Equipment Manufacturer

Implementation of a baseband firewall

References

  1. R. Weinmann, Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks, presented at 6th USENIX Workshop on Offensive Technologies, 6-7 Aug. 2012; www.usenix.org/system/files/conference/woot12/woot12-final24.pdf [accessed 8/23/16].