Close

Biting into the Swiss cheese

A project log for Hacking old Galaxy Tabs for better living

How I helped my high-rise neighbors to actually own their smart homes

neighborinoNeighborino 09/11/2021 at 15:020 Comments

Note that at this point I believed every tablet ran Android OS 4.2.2 Jelly Bean.

I found a great vulnerability resource at http://www.androidvulnerabilities.org/by/version/4.2.2 and in the end reviewed and tried out proof-of-concepts for every supported vulnerability listed.

Besides the generic Android OS vulnerabilities it quickly became apparent that once the Android source went through the hands of Samsung developers and their product managers it gained many preinstalled user-facing and "hidden" apps together with a scary amount of new vulnerabilities, which will later turn out to be a blessing in disguise.

I never before went down the rabbit hole of specific CVEs and it was an exciting and educational journey for me, a Java-focused Android developer with moderate C/Linux knowledge. I felt humbled by the security researchers and disturbed by the amount of attack vectors - in such complex systems it seems you can only do damage-control, you can never be fully secure, especially when considering the competition on the smartphone/tablet market, where companies have to innovate to stay on top and under-the-hood code security counts for much less than the newest buzzwords and product marketing requirements.

Going back to androidvulnerabilities.org, here's what I found out:

Discussions