The Fairphones 3, 4 and 5

Security Update: APEX Modules Vulnerability FIXED

In November 2023, a security vulnerability was detected in an assorted list of smartphones, including the Fairphone 5, by Meta Red Team X. Fairphone took immediate action to release a security fix in mid-December that solved the issue, meaning that every Fairphone model is now secured against this vulnerability.

The vulnerability detected by Meta Red Team X affects APEX modules and the way they are signed; APEX modules allow original equipment manufacturers (“OEMs”) to update specific portions of the system without issuing a full over-the-air (OTA)  update, but instead only delivering the subsystems that need to be updated. These modules need to be signed with the private key of the OEM during the build process, but it was found that our building process had a shortcoming, and we were using a test key (present in the Android source code build tree) instead of Fairphone’s private key.

This means that, in practice, it would have been possible for an attacker to substitute the incorrectly signed modules with other files signed with the same test key, potentially containing malicious code. Having said that, this is not easy to exploit. The substitution would require either physical access to the device, along with the debugging options activated, or remote access obtained through a chain of other critical vulnerabilities. Yet, it did present a high severity vulnerability.

Triggered by the report on Fairphone 5, we also opened an internal investigation on Fairphone 4 and Fairphone 3/3+, where we found similarly affected APEX modules. The vulnerability was resolved in December 2023 for all Fairphone devices with the following software versions, respectively:

If you have not updated your phone recently, we invite you to install the most recent software version available to you. You can always check manually for system updates in the Settings menu under the System sub-menu. More information on the vulnerability can be found on the original report or the security advisory published by Red Team X.

The post you are currently reading is an AMP HTML document; an optimized version for mobile usage to increase loading speed and decrease data usage. To see our full website you can visit our own mobile version of this post.

Salir de la versión móvil

Suscríbete a nuestro newsletter para enviarte noticias sobre nuestros proyectos

Suscríbete a nuestra newsletter y recibe 5€ de descuento en tu próximo pedido.

Enviaremos el €5 de descuento al correo electrónico que haz especificado en el momento del registro. El código de descuento puede ser utilizado en tu próxima compra superior a 75€. Por favor ten en cuenta que nuestro principal idioma de comunicación es el Inglés. Al suscribirte, aceptas que la información que nos envías será procesada de acuerdo a nuestra Política de Privacidad y Términos de uso.Te pedimos tu nombre y dirección de correo electrónico para enviarte nuestro newsletter con noticias sobre nuestros proyectos, puedes darte de baja en cualquier momento si así lo deseas.

Close
Salir de la versión móvil