Incident: Broadcom Wi-Fi Chip Vulnerability Leads to Smartphone Hacking Incident

Published Date: 2017-07-27

Postmortem Analysis
Timeline 1. The software failure incident, known as Broadpwn, happened around a year ago from the time of the article's publication in July 2017 [61282]. Therefore, the software failure incident occurred around July 2016.
System 1. Broadcom Wi-Fi chip module in iPhones and most modern Android devices [61282]
Responsible Organization 1. Broadcom's Wi-Fi chip module was responsible for causing the software failure incident described in the article [61282].
Impacted Organization 1. Apple 2. Google [Cite: <Article 61282>]
Software Causes 1. The software cause of the failure incident was a bug in the Broadcom Wi-Fi chip module that affected iPhones and most modern Android devices, allowing a hacker to invisibly hack into any one of a billion devices [61282].
Non-software Causes 1. Lack of proper protections in third-party hardware components like Broadcom's Wi-Fi chips [61282] 2. Vulnerabilities in relatively unexamined components like those sold by Broadcom [61282] 3. Lack of strict auditing of chips handling Wi-Fi, Bluetooth, or near-field communications [61282]
Impacts 1. The software failure incident involving the Broadpwn vulnerability in the Broadcom Wi-Fi chip had the potential to allow a hacker to invisibly hack into any one of a billion devices, including iPhones and Android devices [61282]. 2. The vulnerability could have enabled a hacker within Wi-Fi range to not only hack a victim's phone but also turn it into a rogue access point, infecting nearby phones and spreading rapidly, potentially creating the first Wi-Fi worm [61282]. 3. The flaw in the Broadcom chip's firmware allowed for a heap overflow bug, which could corrupt the module's memory and run commands, potentially taking over the Wi-Fi chip without the user noticing any issues [61282]. 4. The attack could repurpose the Wi-Fi chip as an access point itself, broadcasting the attack to vulnerable phones within range and exponentially spreading through the smartphone world [61282]. 5. The incident highlighted the danger of vulnerabilities in relatively unexamined components like those sold by Broadcom, emphasizing the need for device manufacturers to consider the security of third-party components and build in protections to limit damage if they are hacked [61282].
Preventions 1. Regular software updates and patches: Keeping devices updated with the latest software patches, as done by Google and Apple in response to the Broadpwn vulnerability, can prevent software failures caused by known bugs or vulnerabilities [61282]. 2. Implementing security measures in third-party components: Device manufacturers should consider the security of third-party components, like Wi-Fi chips, and build in protections to limit the damage in case of a hack [61282]. 3. Conducting thorough security audits of all components: Regularly auditing components handling critical functions like Wi-Fi, Bluetooth, or near-field communications can help identify and address vulnerabilities before they are exploited by hackers [61282].
Fixes 1. Updating the iPhone and Android devices with the recent patches provided by Google and Apple to fix the Broadpwn bug in the Broadcom Wi-Fi chip [61282].
References 1. Security researcher Nitay Artenstein [Article 61282] 2. Google [Article 61282] 3. Apple [Article 61282] 4. Gal Beniamini, member of Google's Project Zero research team [Article 61282] 5. Qualcomm security engineering manager Alex Gantman [Article 61282]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to a Broadcom Wi-Fi chip vulnerability has happened again within the same organization. Earlier in the year, both Apple and Google had to rush out patches for another Broadcom Wi-Fi flaw, found by a member of Google's Project Zero research team [61282]. This indicates that Broadcom's bugs have affected the smartphone industry multiple times, specifically with vulnerabilities in their Wi-Fi chips. (b) The software failure incident related to the Broadcom Wi-Fi chip vulnerability has also happened at multiple organizations. The article mentions that vulnerabilities in relatively unexamined components like those sold by Broadcom have been a concern in the cybersecurity world since around 2010. This indicates that other organizations using Broadcom's Wi-Fi chips may have been impacted by similar vulnerabilities [61282].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be seen in the article where a vulnerability in the Broadcom Wi-Fi chip module was discovered by security researcher Nitay Artenstein. This flaw in the design of the chip had the potential to undermine the security of a billion devices, including iPhones and Android devices [61282]. (b) The software failure incident related to the operation phase is evident in the article where the vulnerability in the Broadcom Wi-Fi chip could have allowed a hacker within Wi-Fi range to hack a victim's phone and even turn it into a rogue access point, infecting nearby phones. This highlights a failure in the operation of the Wi-Fi chip and the potential misuse of the system by hackers [61282].
Boundary (Internal/External) within_system, outside_system The software failure incident described in the articles can be categorized as both within_system and outside_system: (a) within_system: The software failure incident was caused by a bug in the Broadcom Wi-Fi chip module that affected iPhones and Android devices [61282]. This bug allowed a hacker to invisibly hack into devices and potentially turn them into rogue access points, spreading the attack to nearby phones [61282]. The flaw in the Broadcom chip module was a critical vulnerability that could completely undermine the security of the devices [61282]. (b) outside_system: The vulnerability in the Broadcom Wi-Fi chip module was a result of a flaw in a third-party component that was not entirely controlled by Apple and Google, the manufacturers of the devices [61282]. The bug in the Broadcom chip module was a contributing factor originating from outside the core operating systems of the devices, highlighting the risks associated with vulnerabilities in peripheral components [61282].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in the article was primarily due to non-human actions, specifically a bug in the Broadcom Wi-Fi chip module that allowed a hacker to invisibly hack into a billion devices [61282]. The vulnerability in the Wi-Fi chip was a flaw that had the potential to completely undermine the security of iPhones and most modern Android devices. This bug, known as Broadpwn, could allow a hacker within Wi-Fi range to hack a victim's phone and even turn it into a rogue access point, spreading the attack to nearby phones [61282]. (b) However, human actions were also involved in addressing the software failure incident. Security researcher Nitay Artenstein discovered the bug in the Broadcom chip module and presented his findings at the Black Hat security conference and in a subsequent WIRED interview [61282]. Both Google and Apple rushed to patch the bug after Artenstein's discovery, with Google releasing an update for Android phones in early July and Apple following with an iOS fix [61282]. This proactive response by Google and Apple highlights the importance of human actions in addressing software vulnerabilities and preventing potential widespread attacks.
Dimension (Hardware/Software) hardware, software (a) The software failure incident in the articles is related to hardware. The incident was caused by a bug in the Broadcom Wi-Fi chip module that affected a vast number of devices, including iPhones and Android smartphones. The vulnerability in the hardware component allowed hackers to exploit it and potentially compromise the security of the devices [61282]. The flaw in the Broadcom chip module was a critical issue that could be exploited without the user's knowledge, highlighting the importance of securing third-party hardware components in devices. (b) The software failure incident also has implications for software security. While the vulnerability originated in the hardware component, the incident underscores the need for robust software patches and updates to address such vulnerabilities. Both Google and Apple rushed to release patches to fix the bug in the Broadcom chip, demonstrating the critical role of software updates in mitigating security risks [61282]. The incident highlights the interconnected nature of hardware and software security in modern devices.
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the articles is malicious in nature. The incident involved a bug in a Wi-Fi chip that could have allowed a hacker to invisibly hack into a billion devices, turning them into rogue access points to infect nearby phones [61282]. The vulnerability, known as Broadpwn, was discovered by security researcher Nitay Artenstein, who found a flaw in the Broadcom chip module that could completely undermine the security of iPhones and modern Android devices [61282]. The attack could occur without the user noticing anything amiss, and the potential severity of the attack points to the danger of vulnerabilities in relatively unexamined components like those sold by Broadcom [61282]. The incident highlights the increasing focus of hackers on exploiting flaws in peripheral components of devices as mainstream operating systems become more secure [61282].
Intent (Poor/Accidental Decisions) accidental_decisions (a) The intent of the software failure incident was not due to poor decisions but rather due to accidental decisions or mistakes. The vulnerability in the Broadcom Wi-Fi chip, known as Broadpwn, was discovered by security researcher Nitay Artenstein during his reverse-engineering process of the chip's firmware [61282]. Artenstein found a crucial bug in the Broadcom chip's "association" process, which allowed for a heap overflow, enabling a hacker to corrupt the module's memory and run commands [61282]. This bug was not a result of poor decisions but rather a flaw in the code that was accidentally present and exploitable.
Capability (Incompetence/Accidental) accidental (a) The software failure incident described in the articles is not attributed to development incompetence. Instead, it is primarily due to a bug in a Wi-Fi chip manufactured by Broadcom that was discovered by security researcher Nitay Artenstein [61282]. (b) The software failure incident was accidental in nature as it was caused by a bug in the Broadcom Wi-Fi chip that was not intentionally introduced but rather existed due to a flaw in the firmware of the chip [61282].
Duration permanent, temporary (a) The software failure incident described in the articles is more of a permanent nature. The vulnerability in the Broadcom Wi-Fi chip, known as Broadpwn, had the potential to completely undermine the security of a billion devices, including iPhones and Android devices [61282]. The flaw in the Broadcom chip module allowed a hacker to invisibly hack into any vulnerable device within Wi-Fi range, turning it into a rogue access point that could infect nearby phones as well, creating the potential for a Wi-Fi worm to spread rapidly [61282]. The vulnerability persisted in phones for years before being discovered and patched by Google and Apple [61282]. (b) The software failure incident can also be considered temporary to some extent as the vulnerability was eventually patched by both Google and Apple. Google pushed out an update for Android phones in early July, and Apple followed with an iOS fix well before the full details of the findings were revealed [61282]. The temporary nature of the failure lies in the fact that once the patch was applied, the specific vulnerability that allowed the hack was mitigated, preventing further exploitation of the flaw.
Behaviour value, other (a) crash: The software failure incident described in the articles does not involve a crash where the system loses state and does not perform any of its intended functions. Instead, the vulnerability in the Broadcom Wi-Fi chip allowed a hacker to invisibly hack into devices and potentially turn them into rogue access points [61282]. (b) omission: The software failure incident is not related to the system omitting to perform its intended functions at an instance(s). The vulnerability in the Broadcom Wi-Fi chip allowed unauthorized access and control over devices, rather than the system omitting its functions [61282]. (c) timing: The software failure incident is not characterized by the system performing its intended functions correctly but too late or too early. The vulnerability in the Broadcom Wi-Fi chip allowed immediate unauthorized access and control over devices, without any delay in the system's response [61282]. (d) value: The software failure incident is related to the system performing its intended functions incorrectly. The flaw in the Broadcom Wi-Fi chip allowed a hacker to exploit a bug in the chip's firmware, leading to unauthorized access and control over devices, which is an incorrect behavior [61282]. (e) byzantine: The software failure incident does not exhibit a byzantine behavior where the system behaves erroneously with inconsistent responses and interactions. The vulnerability in the Broadcom Wi-Fi chip allowed consistent unauthorized access and control over devices, rather than erratic or inconsistent behavior [61282]. (f) other: The software failure incident can be categorized as a security vulnerability that allowed unauthorized access and control over devices through exploiting a flaw in the Broadcom Wi-Fi chip's firmware. This behavior falls under the category of a security breach or exploit, which is not explicitly covered in the options provided [61282].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure. The software failure incident described in the articles pertains to a vulnerability in the Broadcom Wi-Fi chip that could have allowed hackers to invisibly hack into a billion devices, including iPhones and Android devices [61282]. This vulnerability, known as Broadpwn, could have enabled a hacker to not only hack a victim's phone but also turn it into a rogue access point, potentially infecting nearby phones as well [61282]. The flaw in the Broadcom chip module could completely undermine the security of these devices, potentially leading to unauthorized access to personal data, financial information, and other sensitive data stored on the devices [61282]. The article highlights that both Google and Apple rushed to patch the bug to prevent such unauthorized access and potential data breaches [61282].
Domain information (a) The software failure incident discussed in the articles pertains to the technology industry, specifically affecting mobile devices like iPhones and Android smartphones due to a vulnerability in the Broadcom Wi-Fi chip [61282]. This incident highlights the importance of securing components sourced from third-party companies to prevent potential hacks and breaches in the technology sector.

Sources

Back to List