5 pași simpli pentru a ocoli ecranele de blocare Google Pixel PlatoBlockchain Data Intelligence. Căutare verticală. Ai.

5 pași simpli pentru a ocoli ecranele de blocare Google Pixel

The November 2022 Android update includes a remediation for a bug that could allow an attacker to bypass the Google Pixel lock screen.

The researcher behind the discovery, David Schütz, reported the Google Pixel security flaw back in June after a series of errors led him to finding the vulnerability. He had forgotten his PIN after his device ran out of battery and died. After reboot, Schütz entered an incorrect PIN number three times, triggering the SIM card to lock itself. 

Luckily, he explained in a blog post this week, he had the original SIM packaging with the factory personal unlocking key (PUK) code to open the SIM card. From there he was able to gain access to the device without ever entering the correct PIN.

“After I calmed down a little bit, I realized that indeed, this is a got d*mn full lock screen bypass, on the fully patched Pixel 6. I got my old Pixel 5 and tried to reproduce the bug there as well. It worked too,” he wrote. 

Google Pixel lock screen bypass vulnerability is tracked under CVE-2022-20465. Here are the bypass steps, according to Schütz: 

  1. Introduceți codul PIN greșit de trei ori.
  2. Hot-swap the device SIM for an attacker-controlled SIM with known PIN code.
  3. Enter the new SIM’s eight-digit PUK code. 
  4. Enter the new device PIN.
  5. Presto! The device unlocks.

For his efforts, Schütz said he was awarded a $70,000 bug bounty, along with bragging rights. 

Fiți la curent cu cele mai recente amenințări la adresa securității cibernetice, vulnerabilități recent descoperite, informații despre încălcarea datelor și tendințe emergente. Livrat zilnic sau săptămânal direct în căsuța de e-mail.

Timestamp-ul:

Mai mult de la Lectură întunecată