Real-Life Case Study: Samsung Exynos Baseband
In this chapter, we will explore the combination of emulation, fuzzing, and vulnerability exploitation and gather the information from the previous two chapters into one concrete case study on CVE-2020-25279. In this chapter, we will look at a vulnerability that was found in modern Samsung phones such as the Galaxy S10, which could take over the phone modem with a fake GSM call. We will go through the entire process with the help of FirmWire (https://firmwire.github.io/docs/index.html). Moreover, we will explain other methodologies that could help us find the same vulnerability and compare the advantages of emulation.
The following topics will be covered in this chapter:
- A crash course on mobile phone architecture
- Setting up FirmWire for vulnerability validation