Line 74: |
Line 74: |
| | February 2015 | | | February 2015 |
| | [[User:Yellows8|Yellows8]], [[User:Plutooo|plutoo]] | | | [[User:Yellows8|Yellows8]], [[User:Plutooo|plutoo]] |
− | |-
| |
− | | FIRM partitions known-plaintext
| |
− | | The [[Flash_Filesystem|FIRM partitions]] are encrypted with AES-CTR without a MAC. Since this works by XOR'ing data with a static (per-console in this case) keystream, one can deduce the keystream of a portion of each FIRM partition if they have the actual FIRM binary stored in it.
| |
− |
| |
− | This can be paired with many exploits. For example, it allows minor FIRM downgrades (i.e. 10.4 to 9.6 or 9.5 to 9.4, but not 9.6 to 9.5).
| |
− | However it is most commonly used to install arbitrary FIRMs (usually boot9strap), thanks to sighax.
| |
− |
| |
− | This can be somewhat addressed by having a FIRM header skip over previously used section offsets, but this would just air-gap newer FIRMs without fixing the core bug. This can also only be done a limited number of times due to the size of FIRM versus the size of the partitions.
| |
− | | None
| |
− | | New3DS
| |
− | |
| |
− | | Everyone
| |
| |- | | |- |
| | RSA keyslots don't clear exponent when setting modulus | | | RSA keyslots don't clear exponent when setting modulus |
Line 99: |
Line 87: |
| | March 2016 | | | March 2016 |
| | [[User:Myria|Myria]] | | | [[User:Myria|Myria]] |
− | |-
| |
− | | Boot9 AES keyinit function issues
| |
− | | [[Bootloader|Boot9]] seems to have two bugs in the AES key-init function, see [[AES_Registers#AES_key-init|here]].
| |
− | | None
| |
− | | BootROM issue.
| |
− | | 2015
| |
− | | [[User:Yellows8|Yellows8]]
| |
| |- | | |- |
| | [[CONFIG11_Registers#CFG11_GPUPROT|CFG11_GPUPROT]] allowing acccess to AXIWRAM/FCRAM-BASE-memregion | | | [[CONFIG11_Registers#CFG11_GPUPROT|CFG11_GPUPROT]] allowing acccess to AXIWRAM/FCRAM-BASE-memregion |
Line 114: |
Line 95: |
| | New3DS | | | New3DS |
| | February 7, 2017 | | | February 7, 2017 |
| + | | [[User:Yellows8|Yellows8]] |
| + | |} |
| + | |
| + | == Boot ROM == |
| + | {| class="wikitable" border="1" |
| + | ! Summary |
| + | ! Description |
| + | ! Fixed with hardware model/revision |
| + | ! Newest hardware model/revision this flaw was checked for |
| + | ! Timeframe this was discovered |
| + | ! Discovered by |
| + | |- |
| + | | FIRM partitions known-plaintext |
| + | | The [[Flash_Filesystem|FIRM partitions]] are encrypted with AES-CTR without a MAC. Since this works by XOR'ing data with a static (per-console in this case) keystream, one can deduce the keystream of a portion of each FIRM partition if they have the actual FIRM binary stored in it. |
| + | |
| + | This can be paired with many exploits. For example, it allows minor FIRM downgrades (i.e. 10.4 to 9.6 or 9.5 to 9.4, but not 9.6 to 9.5). |
| + | However it is most commonly used to install arbitrary FIRMs (usually boot9strap), thanks to sighax. |
| + | |
| + | This can be somewhat addressed by having a FIRM header skip over previously used section offsets, but this would just air-gap newer FIRMs without fixing the core bug. This can also only be done a limited number of times due to the size of FIRM versus the size of the partitions. |
| + | | None |
| + | | New3DS |
| + | | |
| + | | Everyone |
| + | |- |
| + | | Boot9 AES keyinit function issues |
| + | | [[Bootloader|Boot9]] seems to have two bugs in the AES key-init function, see [[AES_Registers#AES_key-init|here]]. |
| + | | None |
| + | | BootROM issue. |
| + | | 2015 |
| | [[User:Yellows8|Yellows8]] | | | [[User:Yellows8|Yellows8]] |
| |- | | |- |