• Archives
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Service news

Unveiling Encryption Key Vulnerability in Qualcomm-Powered Android Devices

Paul Balo by Paul Balo
July 4, 2016
in Service news
Share on FacebookShare on Twitter

An in-depth analysis led by an Israeli researcher, Gal Beniamini, has discovered a worrying vulnerability in Android’s Full Disk Encryption (FDE) on hardware using Qualcomm’s chip. The study, published [in his blog post](https://bits-please.blogspot.com.ng/2016/06/extracting-qualcomms-keymaster-keys.html) casts a spotlight on the unwelcome comparison between the encoder safety of iOS – which was ultimately decimated by the FBI – and Qualcomm boosted Android devices, which maintain encryption keys in the software.

Two vulnerabilities, [CVE-2015-6639](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-6639) and [CVE-2016-2431](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2431) form the crux of this research. Although Google and Qualcomm have reportedly fixed them, with the first in January and the latter in May, they still awarded the researcher for his effort under the bug bounty program.

Interestingly, while security team Duo Security confirmed that both flaws have been repaired on a large scale, they estimate that 37% of Android devices that employ the Duo app are still susceptible to attacks because patches have yet to reach them. Furthermore, Beniamini suggested that some Android devices once susceptible but subsequently repaired, including a tested Nexus 6 unit, can be reverted to their insecure former states.

Beniamini’s research imperatively included [exploit code](https://github.com/laginimaineb/ExtractKeyMaster) that extracts the disk encryption keys by effectively leveraging both vulnerabilities in [TrustZone](http://www.arm.com/products/processors/technologies/trustzone/index.php), a suite of security-related features within the [ARM processors](http://www.arm.com/products/processors/index.php) that Qualcomm provides to phone manufacturers.

A measure of the encryption potency of Apple’s iOS devices and Qualcomm augmented Android devices was provided by the researcher. He cited that each appliance has a unique, unchangeable 256-bit key termed the UID, which is arbitrarily generated and integrated into the device’s hardware during manufacturing. Even Apple is unable [to pry out from the device](http://techbooky.com/even-apple-cannot-access-encrypted-data-on-newer-iphones-plus-over-6-5-million-pay-for-apple-music/) once sealed in.

This research starkly highlights the considerable difference between the encryption provided by Apple’s iOS and Qualcomm’s Android devices. It is vital to note that while it might be a complex task to break into these Android devices, it is not entirely impossible with advanced techniques or a potentially robust password.

Beniamini’s research provides the following four concrete takeaways:

1. **The key derivation is not hardware bound.** This suggests that the vulnerability is software-based, escalating potential threat levels for millions of devices.

2. **OEMs can comply with law enforcement to break Full Disk Encryption.** Essentially, it would enable law enforcement agencies to effortlessly execute a brute-force attack on the FDE password off the device using leaked keys.

3. **Patching TrustZone vulnerabilities doesn’t necessarily provide full protection.** Attackers could potentially exploit TrustZone to extract keys and use them to brute-force the encryption.

4. **Android FDE is only as secure as the TrustZone kernel or KeyMaster.** This means finding vulnerabilities in either of them could potentially expose the KeyMaster keys, enabling off-device attacks on Android [FDE](https://www.techbooky.com/).

Android operating system vulnerabilities have often been the subject of numerous studies, with varying results. Despite several security breaches, the overarching problem lies not with Android itself, but primarily with third-party devices or applications susceptible to security breaches.

This article was updated in 2025 to reflect modern realities.

Related Posts:

  • Qualcomm
    Zero-Day Flaw in Qualcomm Chips Exploited to Attack…
  • qualcomm-extends-support-for-updates-on-android-devices-snapdragon-8-elite
    Qualcomm Aims at Expanding Android Phone Support
  • whatsapp icon
    WhatsApp Fixes Bug in View-Once Media Feature
  • Chrome-Android-Speedometer-benchmark-1
    Android Device Speedometer Benchmark Scores Are…
  • Oryon_Block_Diagram
    Qualcomm Launches Brand New Chips For Snapdragon Devices
  • Win 8
    Qualcomm Tops Estimates with Strong Handset Chip…
  • shutterstock_chatgpt
    Researchers Warn ChatGPT Crawler May Cause DDoS…
  • Qualcomm Q3 Earning Beat, Q4 Guidance Comes Short

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: androidqualcommsecurity
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • How to Read Faster: 10 Best Speed Reading Apps in 2025 (Ranked & Reviewed) August 31, 2025
  • WhatsApp Working On Shorter Disappearing Message Timers August 29, 2025
  • Threads Tests Long-Form Text Sharing Feature August 29, 2025
  • WhatsApp Tests AI to Rephrase Messages and Adjust Tone August 29, 2025
  • Musk’s xAI Unveils New Agentic Coding Model August 29, 2025
  • Google Launches Pixel Care+ Device Protection August 29, 2025

Browse Archives

September 2025
MTWTFSS
1234567
891011121314
15161718192021
22232425262728
2930 
« Aug    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.