Too many perfectly usable phones are put into a questionable security situation by lack of vendor support for keeping key software up to date.

But what’s the actual risk of using an Android phone on a stock ROM without updates? What’s the attack surface?

It seems like most things that’d contact potentially malicious software are web and messaging software, but that’s all done by apps which continue to receive updates (at least until the android version is entirely unsupported) eg. Webview, Firefox, Signal, etc.

So are the main avenues for attack then sketchy apps and wifi points? If one is careful to use a minimal set of widely scrutinised apps and avoid connecting to wifi/bluetooth/etc. devices of questionable provenance is it really taking that much of a risk to continue using a device past EOL?

Or do browsers rely on system libraries that have plausible attack vectors? Perhaps images, video, font etc. rendering could be compromised? At this point though, that stack must be quite hardened and mature, it’d be major news for libjpg/ffmpeg to have a code-execution vulnerability? Plus it seems unlikely that they wouldn’t just include this in webview/Firefox as there must surely be millions of devices in this situation so why not take the easy step of distributing a bit more in the APK?

I’m not at all an Android developer though, perhaps this is very naive and I’m missing something major?

  • @argv_minus_one@beehaw.org
    link
    fedilink
    English
    4
    edit-2
    11 months ago

    Vulnerabilities in the baseband chip mean that, whether it runs a custom operating system or not, all old phones should be considered compromised.

    Such vulnerabilities are impossible to fix or mitigate because the baseband firmware is proprietary, exists outside the operating system, is responsible for communicating with the outside world (meaning literally anyone can attack it at any time), and has unfettered access to the entire phone (meaning it can take over the operating system).

    Don’t use an old phone for anything unless you’re comfortable with some overseas crime ring seeing it.

    Just to make it clear: flashing a different OS will not protect you!

    • @henfredemars
      link
      English
      6
      edit-2
      11 months ago

      It’s not necessarily true that the baseband has unfettered access to the entire phone. Pixel devices for example use a special IOMMU to restrict what the baseband can access, forcing it to go through a specialized interface only. It still requires more work for a compromise of baseband to get control of Android.

      First you need to exploit the baseband. Then, you need to exploit the kernel.

      Now, that’s a significant attack surface, but the point stands that many phones now have some compartmentalization because of this risk. This has been a concern for some time and newer designs are trying to mitigate it.

      Here’s a security evaluation of the pixel which shows that a compromise of the modem does not equate to an immediate compromise of the device. The modem must be restricted in what it can access of the application processor.