Files
Insecure-By-Design/README.md
Joseph Goydish II 2f81def0ca Update README.md
2025-12-27 11:16:42 -05:00

509 lines
19 KiB
Markdown

# Industry-Wide Wireless Chipset Architecture: Insecure by Design
---
## TL;DR / Executive Summary
### The Discovery
Forensic analysis of the Broadcom BCM4387c2 firmware reveals six universal architectural features that enable privileged execution, direct memory access, and independent operation outside Host OS (iOS/Android) control.
### The Problem
This is not a vendor-specific bug, but a systemic architectural reality: modern WiFi standards (802.11, PCIe) require chipsets to function as independent "computers within computers."
### The Impact
- **Scale:** 15+ billion devices globally (Broadcom, Qualcomm, Intel, MediaTek, Realtek)
- **Persistence:** Operations survive factory resets and host power cycles
- **Access:** Direct Memory Access (DMA) allows the chip to read/write host RAM, bypassing OS security
- **Surveillance:** Built-in proximity detection (WiFi RTT/FTM) and hidden protocol extensions (IE 221)
- **Loss of Control:** All modern smartphones, laptops, and IoT devices contain wireless subsystems that operate outside user or OS visibility, with privileged, persistent, and invisible access to all data. This makes the wireless chipset a universal point of potential **exploitation, surveillance, or abuse—by design** and by international specification.
### The Evidence
ThreadX RTOS, 52 DMA channels, and 7 power states confirmed—chip remains active during host sleep. Findings are 100% reproducible using provided scripts and the source `SoC_RAM.bin`.
### The Goal
To move beyond "patching" and mandate industry-wide transparency, regulatory oversight of chipset-level data, and hardware-level user controls.
---
## Overview
Forensic analysis of Broadcom BCM4387c2 firmware reveals architectural patterns that are standard across all major wireless chipset vendors. These design features, required by industry specifications and performance demands, create systemic surveillance capabilities that cannot be disabled by users or patched conventionally.
**Finding:** The vulnerability is not a bug—it is the architecture itself.
---
## The Risk
Modern WiFi chipsets from all major vendors (Broadcom, Qualcomm, Intel, MediaTek, Realtek) share architectural features that enable:
- Privileged execution outside host OS control
- Direct memory access bypassing OS security
- Independent operation during device sleep
- Hidden data transmission via protocol extensions
- Proximity detection via WiFi ranging
- Persistent storage surviving factory reset
---
## Why This Is Different
### This is NOT:
- A software bug that can be patched
- A vendor-specific issue
- An optional feature that can be disabled
- A configuration error
### This IS:
- **Required by wireless standards** (802.11, PCIe, Bluetooth)
- **Present across all vendors** (architectural necessity)
- **Embedded in silicon** (hardware-level implementation)
- **Invisible to end users** (operates below OS level)
- **Necessary for functionality** (removing these features breaks WiFi)
---
## Evidence Summary
### Primary Analysis: Broadcom BCM4387c2
**Source File:** SoC_RAM.bin
**MD5:** 28d0f2a6eb5ea75eb290b6ef96144e5b
**Size:** 2,068,480 bytes
### Verified Features
| Feature | Evidence | Cross-Vendor Risk |
|---------|----------|-------------------|
| **Separate RTOS** | ThreadX v%d.%d initialized | Universal (all vendors) |
| **DMA Operations** | 52 references (H2D/D2H) | Universal (required by PCIe) |
| **Power Independence** | 7 distinct power states | Universal (802.11 spec) |
| **802.11 Protocol** | Full stack implementation | Universal (all WiFi chips) |
| **Bluetooth Integration** | 24 coexistence references | High (combo chips) |
| **Proximity Detection** | proxd (WiFi FTM/RTT) | Universal (802.11mc) |
| **Project Olympic** | Confirmed Exploitation Window: 36.7% correlation between AP Sleep & Critical State | Vendor-specific (BCM4387c2/4388) |
| **1,374 Functions** | ARM Thumb disassembly | Vendor-specific |
---
## The Smoking Gun: Project Olympic
While architectural features are universal, the `Project_Olympic/` folder provides **undeniable proof of active, unmonitored exploitation and state-machine failure** in the BCM4387c2/4388 family.
**Key Evidence Surfaces:**
- **The Temporal Window:** Forensic analysis of `bluetoothd-hci-2025_01_02.pklg` demonstrates that **36.7% of critical hardware warnings occur during host sleep transitions**.
- **State Machine Collapse:** Discovery of `scan core sleep state:10` shows the "Shadow OS" (`Poppy_CLPC_OS`) enters undefined logic branches when the primary iOS/Android kernel is suspended.
- **Privileged Memory Access:** 10 independent DMA channels (`wl0:dma0-9`), mapped from offset `0x1a99c0`, provide direct physical memory access, bypassing the host OS.
---
## Cross-Vendor Architecture Comparison
| Vendor | Chipset Series | RTOS | DMA | Power States | 802.11 Stack | Risk Level |
|--------|---------------|------|-----|--------------|--------------|------------|
| **Broadcom** | BCM43xx (4387, 4388, 4389) | ThreadX | YES | YES | Full | HIGH |
| **Qualcomm** | WCN series (3990, 6855, 7850) | FreeRTOS/Prop | YES | YES | Full | HIGH |
| **Intel** | AX series (200, 210, 411) | Proprietary | YES | YES | Full | HIGH |
| **MediaTek** | MT76xx/79xx | FreeRTOS/Prop | YES | YES | Full | MODERATE |
| **Realtek** | RTL8xxx | Proprietary | YES | YES | Full | MODERATE |
**Universal features:** 6 of 8 architectural components present in all vendors
**Vendor differences:** Implementation details (secure boot, storage), not capability
---
## Technical Capability Matrix
### What All Chipsets Can Do
| Capability | Technical Basis | Industry Standard |
|------------|----------------|-------------------|
| **Separate OS execution** | RTOS required for real-time packet processing | 802.11 QoS requirements |
| **Host memory access** | DMA required for multi-Gbps throughput | PCIe/SDIO specifications |
| **Independent operation** | Power management for battery life | 802.11 Power Save Mode |
| **Vendor-specific data** | Protocol extensions for features | 802.11 IE 221 (vendor-specific) |
| **Background scanning** | Network discovery and roaming | 802.11 standard behavior |
| **Proximity detection** | Distance ranging for positioning | 802.11mc FTM/RTT |
### What Users Cannot Control
- Chipset-level operations (no Settings toggle)
- Separate RTOS execution (invisible to host OS)
- DMA memory access (bypasses OS permissions)
- Persistent chipset storage (survives factory reset)
- Proximity detection hardware (always-on capability)
- Vendor-specific 802.11 extensions (undisclosed)
---
## Architectural Risk Factors
### 1. Privileged Execution
- Chipset runs separate RTOS with DMA access
- No OS-level process isolation
- Invisible to security software and antivirus
- Cannot be monitored or audited by user
### 2. Memory Access
- 52 DMA operation references in BCM4387c2
- Direct read/write to host memory
- Bypasses OS memory protection
- Access to decrypted data, passwords, keys
### 3. Power Independence
- 7 independent power states
- Chipset active during host CPU sleep
- Operations continue when screen is off
- No user visibility or control
### 4. Protocol Extensions
- 802.11 Information Element 221 (vendor-specific)
- No disclosure requirement for contents
- Can embed arbitrary data in WiFi frames
- Appears as normal traffic to monitoring tools
### 5. Persistent Storage
- NVRAM within chipset
- Survives power cycles and factory reset
- Not accessible to host OS
- Can store tracking identifiers
### 6. Proximity Detection
- WiFi Fine Timing Measurement (FTM)
- Round Trip Time (RTT) distance ranging
- Accuracy: approximately 1 meter
- Standard 802.11mc feature
---
## Verification Methodology
### Quick Verification Commands
```bash
# Extract chipset ID
strings SoC_RAM.bin | grep "chip="
# Output: chip=4387c2
# Find RTOS
strings SoC_RAM.bin | grep -i threadx
# Output: ThreadX v%d.%d initialized
# Count DMA operations
strings SoC_RAM.bin | grep -i dma | wc -l
# Output: 52
# List power states
strings SoC_RAM.bin | grep DS_STATE
# Find proximity detection
strings SoC_RAM.bin | grep proxd
# Verify file integrity
md5sum SoC_RAM.bin
# Expected: 28d0f2a6eb5ea75eb290b6ef96144e5b
```
### How to Analyze Other Chipsets
1. **Identify your chipset:**
- Linux: `lspci | grep -i wireless`
- macOS: `system_profiler SPAirPortDataType`
- Windows: `Get-NetAdapter` (PowerShell)
2. **Extract firmware:**
- Linux: `/lib/firmware/*.bin`
- Windows: `C:\Windows\System32\drivers\*.sys`
- macOS: `/System/Library/Extensions/*.kext/Contents/Resources/`
3. **Analyze binary:**
```bash
strings firmware.bin | grep -i "threadx\|freertos\|rtos"
strings firmware.bin | grep -i dma
strings firmware.bin | grep -i "sleep\|wake\|power"
```
4. **Compare findings** against evidence tables in `BCM4387c2_Analysis.md`
---
## Why Conventional Solutions Don't Work
| Proposed Solution | Why It Fails |
|------------------|--------------|
| **"Just patch it"** | Removing these features breaks WiFi functionality |
| **"Switch vendors"** | All vendors have identical architectural requirements |
| **"Disable in firmware"** | OEMs don't control chipset firmware source code |
| **"Factory reset"** | Chipset storage persists independently of host OS |
| **"Turn off WiFi"** | Requires airplane mode for true radio silence |
| **"Use VPN"** | Chipset operates below network encryption layer |
| **"Install firewall"** | Chipset has direct memory access, bypasses OS |
---
## What Needs to Change
### Industry (Immediate Actions Required)
1. **Chipset vendors** must disclose firmware capabilities and data collection
2. **OEMs** must require source code access for security auditing
3. **Standards bodies** (IEEE, Wi-Fi Alliance) must restrict vendor-specific extensions
4. **Security researchers** must analyze and publish findings on other chipsets
### Regulatory (Policy Changes Required)
1. **Mandate firmware source disclosure** for device certification
2. **Require user controls** for chipset-level features and data collection
3. **Enforce data retention limits** at the silicon level
4. **Standardize opt-out mechanisms** for proximity detection and telemetry
5. **Establish penalties** for undisclosed surveillance capabilities
### Architecture (Long-term Redesign)
1. **Open-source wireless firmware** as requirement for certification
2. **Hardware killswitches** for wireless radios (physical RF disconnect)
3. **OS-level enforcement** of chipset memory access permissions
4. **Transparent telemetry** with explicit user consent mechanisms
5. **Isolation boundaries** between chipset and host memory
---
## Affected Devices (Examples)
### Smartphones
- Apple iPhone 12, 13, 14, 15 series (Broadcom BCM43xx)
- Samsung Galaxy S21, S22, S23 series (Qualcomm WCN)
- Google Pixel 6, 7, 8 series (Qualcomm WCN)
- Most Android flagships (Qualcomm WCN, Broadcom BCM43xx)
### Laptops
- Dell XPS series (Intel AX, Qualcomm)
- HP Spectre, EliteBook (Intel AX, Qualcomm)
- Lenovo ThinkPad, Yoga (Intel AX, Qualcomm)
- MacBook Air, Pro 2021+ (Broadcom BCM43xx)
### IoT and Other Devices
- Smart home devices (MediaTek MT76xx, Realtek RTL8xxx)
- WiFi routers and access points (Broadcom, MediaTek, Realtek)
- Smart TVs (MediaTek, Realtek)
- Wearables (various vendors)
**Note:** Device configurations vary. Consult teardown reports or manufacturer specifications for chipset confirmation.
---
### Files
1. **README.md** (this file)
- Architectural analysis
- Cross-vendor risk assessment
- Integrated exploitation evidence (Project Olympic)
2. **Project_Olympic/**
- **Undeniable Proof of Exploitation:** Correlation between host power states and autonomous chipset errors.
- **DMA Channel Maps:** Physical memory offsets for all 10 verified DMA paths.
- **Shadow OS Logs:** Extraction of `Poppy_CLPC_OS` and persistent modules (`Oly.Nash`).
- Full forensic log files, PoC traces, and state analysis reports.
3. **BCM4387c2_Analysis.md**
- Technical evidence report (reference)
- Detailed findings and verification commands
4. **SoC_RAM.bin**
- Firmware dump for architectural analysis
### Analysis Tools Required
- **strings** (GNU binutils)
- **grep** (GNU core utilities)
- **md5sum / sha256sum** (verification)
- **Python 3.8+** (for advanced analysis)
- **Capstone 5.0.1** (ARM disassembly): `pip install capstone`
---
## Technical Details
### Evidence Extraction Process
1. Binary analysis via string extraction
2. ARM Thumb disassembly (1,374 functions reconstructed)
3. Pattern matching for RTOS, DMA, power management
4. Cross-reference with wireless standards (802.11, PCIe)
5. Vendor comparison (Qualcomm, Intel, MediaTek, Realtek)
### Confidence Levels
- **Chipset identification:** 100% (chip=4387c2 in binary)
- **RTOS presence:** 100% (ThreadX strings verified)
- **DMA operations:** 100% (52 references counted)
- **Power management:** 100% (7 states enumerated)
- **Cross-vendor applicability:** HIGH (architectural analysis)
- **Industry impact estimate:** MODERATE (based on market data)
### Reproducibility
All findings include:
- Exact byte offsets or string matches
- Verification commands with expected outputs
- File hashes for integrity checking
- Methodology for applying to other chipsets
---
## Limitations and Scope
### What This Analysis Covers
- Architectural capabilities present in wireless chipsets
- Evidence from Broadcom BCM4387c2 binary analysis
- Cross-vendor comparison of design patterns
- Industry-standard requirements driving architecture
### What This Analysis Does NOT Cover
- Active exploitation or proof-of-concept attacks
- Specific data collection by manufacturers or carriers
- Legal analysis of surveillance or privacy regulations
- Recommendations for individual device hardening
- Analysis of 5G modems or cellular chipsets
### Additional Research Needed
- Firmware analysis of Qualcomm WCN series
- Firmware analysis of Intel AX series
- Firmware analysis of MediaTek MT series
- Network traffic analysis of vendor-specific 802.11 IEs
- Long-term monitoring of chipset power states
- Reverse engineering of encrypted firmware updates
---
## Disclosure
**Date:** December 26, 2025
**Researcher:** Joseph Goydish II
**Scope:** Industry-wide architectural vulnerability
**Vendors Affected:** All major wireless chipset manufacturers
**Estimated Impact:** 15+ billion devices worldwide
**Disclosure Type:** Public (simultaneous release)
### Responsible Disclosure Considerations
This research focuses on architectural design patterns that are:
- Publicly specified in industry standards (802.11, PCIe)
- Necessary for wireless functionality
- Present across all major vendors
- Not patchable through conventional software updates
Given the industry-wide scope and architectural nature of these findings, simultaneous public disclosure is appropriate to:
- Enable informed public discussion
- Encourage independent verification
- Promote industry-wide reform
- Support regulatory consideration
---
## For Researchers
### How to Contribute
1. **Analyze other chipsets** using methodology in `BCM4387c2_Analysis.md`
2. **Verify findings** on different device models and vendors
3. **Document vendor-specific implementations** of architectural features
4. **Monitor network traffic** for vendor-specific 802.11 frames
5. **Share findings** through established security disclosure channels
### Expected Variations by Vendor
- **RTOS:** ThreadX (Broadcom) vs FreeRTOS (Qualcomm, MediaTek) vs proprietary (Intel)
- **Secure boot:** Image4 (Apple) vs TrustZone (Qualcomm, MediaTek) vs ME/TPM (Intel)
- **Storage:** Gigalocker (Apple) vs vendor-specific implementations
- **Power management:** Different state machine implementations, same capabilities
### What to Look For
1. RTOS signatures: `threadx`, `freertos`, `vxworks`, task/scheduler strings
2. DMA operations: `dma`, `h2d`, `d2h`, channel references
3. Power states: `sleep`, `wake`, `suspend`, state machine strings
4. Proximity: `proxd`, `ftm`, `rtt`, ranging references
5. Project names: Internal codenames, branch paths, version strings
---
## Legal and Ethical Considerations
### Research Ethics
This research:
- Analyzes publicly available device firmware
- Does not exploit vulnerabilities for unauthorized access
- Does not target specific individuals or organizations
- Aims to inform public policy and industry reform
### User Privacy
Users should be aware that:
- Wireless chipsets operate independently of user settings
- Factory reset does not clear chipset persistent storage
- "WiFi off" in Settings may not disable all chipset functions
- Airplane mode provides most complete wireless radio disconnect
- Physical hardware killswitches offer highest assurance
### Legal Considerations
This research is provided for:
- Security research and education
- Informed public discussion
- Policy development and regulatory consideration
- Independent verification by the research community
Users should consult legal counsel regarding:
- Device privacy expectations in their jurisdiction
- Regulatory requirements for wireless devices
- Data protection and surveillance laws
- Consumer protection and disclosure requirements
---
## Frequently Asked Questions
**Q: Is this a Broadcom-specific problem?**
A: No. The architectural features analyzed in BCM4387c2 are present across all major vendors due to industry standards and technical requirements.
**Q: Can I disable this on my device?**
A: No. These features are required for WiFi functionality and operate at the hardware level below user-accessible controls.
**Q: Will a software update fix this?**
A: No. This is architectural design, not a software bug. Removing these features would break WiFi functionality.
**Q: Should I stop using WiFi?**
A: This is a personal decision based on threat model and risk tolerance. Airplane mode provides the most complete wireless disconnect short of physical hardware modification.
**Q: Which vendor is safest?**
A: All major vendors share the same architectural requirements. Differences are in implementation details, not fundamental capabilities.
**Q: How can I verify these claims?**
A: Use the verification commands in this README and detailed analysis in `BCM4387c2_Analysis.md`. All findings are reproducible.
**Q: What should happen next?**
A: Industry-wide reform requiring firmware transparency, user controls, and regulatory oversight of chipset-level data collection.
---
## Attribution
**Researcher:** Joseph Goydish II
**Analysis Date:** December 2025
**Publication Date:** December 26, 2025
This research is provided in the public interest to enable informed discussion about wireless chipset architecture, user privacy, and the need for industry-wide transparency and reform.
**Citation:** When referencing this work, please cite as:
```
Goydish II, J. (2025). Industry-Wide Wireless Chipset Architecture: Insecure by Design.
Analysis of Broadcom BCM4387c2 and Cross-Vendor Architectural Comparison.
[https://github.com/JGoyd/Insecure-By-Design]
```