Looks like we have a confirmation that Cellebrite uses memory corruptions in Linux kernel USB drivers to unlock Android phones.
First 2 bugs seem easily discoverable by syzkaller/syzbot with a bit of extra descriptions. 3rd one is likely as well ⤵️
First 2 bugs seem easily discoverable by syzkaller/syzbot with a bit of extra descriptions. 3rd one is likely as well ⤵️
Reposted from
GrapheneOS
securitylab.amnesty.org/latest/2025/...
Amnesty International’s Security Lab has a post about 3 vulnerabilities exploited by Cellebrite to extract data from locked Android devices. GrapheneOS blocked exploiting these vulnerabilities in multiple different ways. We also patched them much earlier.
Amnesty International’s Security Lab has a post about 3 vulnerabilities exploited by Cellebrite to extract data from locked Android devices. GrapheneOS blocked exploiting these vulnerabilities in multiple different ways. We also patched them much earlier.
Comments
https://storage.googleapis.com/syzbot-assets/7efefb59364f/ci2-upstream-usb-c749f058.html#drivers%2fmedia%2fusb%2fuvc%2fuvc_driver.c:~:text=case%20UVC_VS_FORMAT_FRAME_BASED%3A%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20ret%20%3D-,uvc_parse_format,-(dev%2C%20streaming%2C%20format
https://storage.googleapis.com/syzbot-assets/7efefb59364f/ci2-upstream-usb-c749f058.html#sound%2fusb%2fquirks.c:~:text=device%20*/%0A%0Astatic%20int-,snd_usb_mbox2_boot_quirk,-(struct%20usb_device%20*dev
https://github.com/xairy/raw-gadget/issues/72
https://storage.googleapis.com/syzbot-assets/7efefb59364f/ci2-upstream-usb-c749f058.html#drivers%2fhid%2fhid-multitouch.c
https://github.com/google/syzkaller/blob/master/docs/linux/external_fuzzing_usb.md