Threat Category: Baseband Subsystem
ID: STA-19
Threat Description: If the baseband and application processor are not adequately separated, an adversary could exploit this to gain access to primary operating system data.
Threat Origin
Not Applicable, See Exploit or CVE Examples
Exploit Examples
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks 1
CVE Examples
Not Applicable
Possible Countermeasures
Implementation of a baseband firewall
References
R. Weinmann, Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks, presented at 6th USENIX Workshop on Offensive Technologies, 6-7 Aug. 2012; www.usenix.org/system/files/conference/woot12/woot12-final24.pdf [accessed 8/23/16]. ↩