New PS5 exploit unlocks root privileges, read/write memory access

New PS5 exploit unlocks root privileges, read/write memory access


https://ift.tt/LuEPmsi


Hackers are getting closer to fully unlocking user control of the PS5 hardware.

Enlarge / Hackers are getting closer to fully unlocking user control of the PS5 hardware.

Sony

Long-time console hacker and exploit developer SpecterDev has released a PS5 exploit that can give users root privileges and read/write access to large chunks of system memory. While this exploit can’t be used to actually execute arbitrary code just yet, it represents an important step toward getting homebrew code running on the console.

The exploit, released this weekend, makes use of a FreeBSD vulnerability in the system OS that was reported to PlayStation’s HackerOne bounty program in January (a very similar vulnerability on the PS4 was reported to PlayStation in 2020). Making use of the exploit relies on setting up a fake DNS server on your local network such that accessing the PS5’s on-screen manual (which is loaded via the system’s hidden web browser) points instead to a page on your local PC.

From there, the exploit uses an error in how the PS5’s browser implementation handles memory locking while setting IPv6 socket headers. While the details get pretty technical, the exploit essentially sets up a race condition to access that exposed socket header memory before it’s fully locked. That small bit of access is then used as a hook to start reading and writing arbitrary data into large areas of the PS5’s memory via an RPC server on the host machine.

Limitations

Because this exploit relies on a race condition, SpecterDev warns that it only works about 30 percent of the time and might lead to multiple kernel panics (and subsequent lengthy system restarts) before read/write access is successfully obtained. The exploit also can’t currently write to low-level “kernel space” (which is still protected by an intact hypervisor) or even execute any code that a user might write to user space (which relies on areas of “Execute Only Memory” that are still protected).

Still, the exploit provides access to the PS5’s debug menu, as hacker Lance McDonald demonstrated in a tweet last night. It also provides PS5 hackers with an entry point to learn more about the PS5’s memory and security systems and could serve as a potential beachhead for developing a fully homebrew-compatible hack for the console. That said, SpecterDev warns that “homebrew will take a lot of effort” because of the aforementioned security protections that are still intact.

While this exploit currently works on version 4.3 of the PS5 firmware (released last October), SpecterDev speculates that some slight changes could get a similar exploit to work on firmware version 4.5 (released last December). Sony marked the issue as “resolved” on HackerOne in April, though, suggesting that the same vulnerability probably won’t work in firmware versions released since then.

That makes SpecterDev’s entry point different from a distinct, “essentially unpatchable” PS5 exploit revealed by hacker CTurt earlier this month. That method made use of a separate issue with the PS5’s “just-in-time” compilation of emulated PS2-on-PS4 games to gain a hook into the console’s “user space” memory to write and run homebrew code.

While the days of regular PS5 owners being able to install their own homebrew apps on the PS5 may still be a ways off, the hacking community won’t rest until that time arrives.

Tech

via Ars Technica – All content https://arstechnica.com

October 3, 2022 at 04:25PM

Leave a Reply

%d bloggers like this: