MediaTek BootROM Broken, Free Coffee, and an iOS Kernel Exploit

Published: Feb. 9, 2021, 11 p.m.

A lot of discussion this week about OSS security and security processes, an iOS kernel type confusion and MediaTek Bootloader bypass impacting everything since atleast 2014.

\n

\n[00:04:54] Know, Prevent, Fix: A framework for shifting the discussion around vulnerabilities in open source
\n

    \n\t
  • https://security.googleblog.com/2021/02/know-prevent-fix-framework-for-shifting.html

  • \n
\n

\n

\n[00:15:18] Launching OSV - Better vulnerability triage for open source
\n

    \n\t
  • https://security.googleblog.com/2021/02/launching-osv-better-vulnerability.html

  • \n
\n

\n

\n[00:22:38] Most Common Bugs of 2021 So Far
\n

    \n\t
  • https://www.bugcrowd.com/blog/common-bugs-of-2021/

  • \n
\n

\n

\n[00:31:59] Exploiting the Nespresso smart cards for fun and coffee
\n

    \n\t
  • https://pollevanhoof.be/nuggets/smart_cards/nespresso

  • \n
\n

\n

\n[00:39:10] Spoofing and Attacking With Skype
\n

    \n\t
  • https://blog.thecybersecuritytutor.com/spoofing-and-attacking-with-skype/

  • \n
\n

\n

\n[00:45:01] Getting root on webOS
\n

    \n\t
  • https://blog.recurity-labs.com/2021-02-03/webOS_Pt1.html

  • \n
\n

\n

\n[00:51:31] Applying Offensive Reverse Engineering to Facebook Gameroom
\n

    \n\t
  • https://spaceraccoon.dev/applying-offensive-reverse-engineering-to-facebook-gameroom

  • \n
\n

\n

\n[00:59:36] Major Vulnerabilities Discovered in Realtek RTL8195A Wi-Fi Module
\n

    \n\t
  • https://www.vdoo.com/blog/realtek-rtl8195a-vulnerabilities-discovered

  • \n
\n

\n

\n[01:06:32] MTK Bypass Universal
\n

    \n\t
  • https://megafon929.github.io/mtk

  • \n
\n

\n

\n[01:14:13] Project Zero: iOS Kernel privesc with turnstiles [CVE-2020-27932]
\n

    \n\t
  • https://googleprojectzero.blogspot.com/p/rca-cve-2020-27932.html

  • https://googleprojectzero.blogspot.com/p/rca.html

  • \n
\n

\n

\n[01:21:41] Why Security Defects Go Unnoticed during Code Reviews?
\n

    \n\t
  • http://amiangshu.com/papers/paul-ICSE-2021.pdf

  • \n
\n

\n

Watch the DAY[0] podcast live on Twitch (@dayzerosec) every Monday afternoon at 12:00pm PST (3:00pm EST)

\n

Or the video archive on Youtube (@dayzerosec)