[BREAKING!] Samsung Galaxy S3 partial screen-lock bypass Exploit discovered
We just received an information that exploit allowing bypass of screen-lock in Galaxy S 3 device was found by MTI Technology
Details about this flaw was exposed to security lists just a moment ago:
MTI Technology – Vulnerability Research Team
Samsung Galaxy S3 – partial screen-lock bypass
17th Feb 2012
20th Feb 2012
Only tested on Samsung Galaxy SIII kernel version 3.0.31-742798 but it is possible any Samsung device that allows emergency contacts to be used and has S-Voice present could be vulnerable.
It is a Samsung specific bug not an Android one,
MTI technology recently conducted a 45 day internal research program aimed at locating new attacks and vulnerabilities in Android devices. Specifically the Samsung S3 and LG Nexus 4 were tested. Several new issues where located and most of them have or will be reported to the relevant vendors.
MTI will be releasing new advisories in cooperation with the relevant vendors.
Partial device functionality is available to a user from a locked S3, which permits certain activities to be carried out.
III. Problem Description
It is possible to access any functionality available from the S-Voice utility on a Samsung S3 when the phone it locked and a PIN (or other locking method) is set. Any command that can be issued via S-Voice can be issued when the phone is locked; however, only the actual phone / keypad becomes available to a user. Any other applications launched, will still open and execute commands but are not visible to a user and the device will revert back to the lock screen.
To access S-Voice the following steps are followed (assuming the phone is locked with a PIN number):
Press the power / home button to turn phone on,
Swipe the screen to access the PIN entry screen,
Select Emergency Call
Select Emergency Contacts (bottom left icon)
On the Emergency Contact screen, press the Home button twice in quick succession (to active S-Voice)
As soon as the Home button is pressed twice, tap the bottom centre of the screen (the S-Voice Microphone button)
Issue any S-Voice Command.
Commands such as the following can be issued:
Call 12345 – will active the phone, dial the number and display it to a user. The command can be used to call any user, or contact (if the name is known) or even Voicemail if Voicemail has been saved as a contact.
What is number / address – will cause S-Voice to say the number or address associated with a contact
Turn Wi-Fi On / off
Turn Bluetooth on / off
What is on my calendar
Go to Google.com
The S-Voice help screen can be used to obtain a listing of supported / documented commands. MTI were not able to locate any commands not listed in this help page.
A crude method to enumerate contact names is to press the home button from the Emergency Contacts screen and quickly press the message / SMS icon (if stored on the main page) this will briefly display the users SMS inbox, which will reveal contact names.
Low to Medium depending on the information stored on a phone. A malicious user who has access to a locked S3 would be able to obtain information from the schedule / calendar, make phone calls to any phone number (such as a premium rate number), message contacts, update a user’s Facebook / twitter status (if S-Voice is configured to do so), enumerate contact addresses and phone numbers, active Bluetooth and Wi-Fi.
In S-Voice settings, disable the ‘Open S-Voice by double pressing the Home Key’ setting.
Awaiting vendor response. Vendor seems to require Vulnerability Disclosures to be posted in their public developers forum: