Amnesty Finds Cellebrite's Zero-Day Used to Unlock Serbian Activist's Android Phone
Briefly

Amnesty International reported that a Serbian youth activist's Android phone was compromised using a sophisticated zero-day exploit by Cellebrite, targeting vulnerabilities in USB drivers. The exploit enabled the physical bypass of the phone's lock screen. The primary vulnerability, CVE-2024-53104, scored 7.8 on the CVSS and was part of a chain of other vulnerabilities resolved in the Linux kernel. The case exemplifies ongoing risks in Android's security, especially concerning legacy USB kernel drivers.
The exploit, which targeted Linux kernel USB drivers, enabled Cellebrite customers with physical access to a locked Android device to bypass an Android phone's lock screen and gain privileged access on the device.
This case highlights how real-world attackers are exploiting Android's USB attack surface, taking advantage of the broad range of legacy USB kernel drivers supported in the Linux kernel.
Read at The Hacker News
[
|
]