Impact
If a KernelSU installed device is infected with a malware whose app signing block specially constructed, it can take over root privileges on the device.
Description
- The current verification logic actually obtains the signature of the last block with an id of 0x7109871a, while the verification logic during Android installation is to obtain the first one.
- In addition to the actual signature upgrade that has been fixed (KSU thought it was V2 but was actually V3), there is also the problem of actual signature downgrading (KSU thought it was V2 but was actually V1). Find a condition in the signature verification logic that will cause the signature not to be found error, and KernelSU does not implement the same conditions, so KSU thinks there is a V2 signature, but the APK signature verification actually uses the V1 signature.
Patches
Not patched
Workarounds
- Keep the KernelSU manager installed
- Don't install unknown apps
References
- similar cve: CVE-2023-5521
PoC
https://drive.google.com/drive/folders/1XdYCCAhC_mkt1k1IyUiwcgFsuOFvwNRl
Impact
If a KernelSU installed device is infected with a malware whose app signing block specially constructed, it can take over root privileges on the device.
Description
Patches
Not patched
Workarounds
References
PoC
https://drive.google.com/drive/folders/1XdYCCAhC_mkt1k1IyUiwcgFsuOFvwNRl