Baseband Hacking Case Studies

Baseband Vulnerability Case Studies

Explore detailed analyses of real-world baseband vulnerabilities that have affected mobile devices and telecommunications infrastructure. These case studies provide insights into attack vectors, exploitation techniques, and mitigation strategies.

Showing 6 of 6 case studies
Firmware
Critical
Broadpwn: Remote Code Execution via Wi-Fi Chipsets

A critical remote code execution vulnerability in Broadcom's Wi-Fi chipsets that affected millions of Android and iOS devices, allowing attackers to execute arbitrary code on the baseband processor.

2017
View Details
Hardware
High
checkm8: Unpatchable iOS Bootrom Exploit

An unpatchable bootrom vulnerability affecting hundreds of millions of iOS devices that allows permanent jailbreaking and potential baseband access.

2019
View Details
Protocol
High
SIMjacker: Remote SIM Card Exploitation

A vulnerability in the SIM card's S@T Browser that allows attackers to send SMS commands to execute operations on the victim's device, including location tracking.

2019
View Details
Implementation
Critical
BlueBorne: Bluetooth Implementation Vulnerabilities

A collection of vulnerabilities in Bluetooth implementations that affected billions of devices, allowing attackers to take complete control of devices via Bluetooth without pairing.

2017
View Details
Protocol
High
KRACK: Key Reinstallation Attacks on WPA2

A vulnerability in the WPA2 protocol that allows attackers to intercept and decrypt Wi-Fi traffic, affecting virtually all Wi-Fi devices.

2017
View Details
Firmware
Critical
Qualcomm Baseband Remote Code Execution

A critical vulnerability in Qualcomm's baseband processor that allowed remote code execution via specially crafted radio packets.

2020
View Details
Select a Case Study

Select a case study from the list to view detailed information about the vulnerability, including technical details, exploit analysis, impact assessment, and mitigation strategies.

Related Resources

Baseband Methodology

Learn about methodologies for analyzing and testing baseband security.

Baseband Tools

Discover tools for baseband security research and vulnerability analysis.

Attack Vectors

Understand common attack vectors targeting baseband processors.