{"id":1054,"date":"2017-07-27T09:17:33","date_gmt":"2017-07-27T01:17:33","guid":{"rendered":"https:\/\/tongwing.woon.sg\/blog\/?p=1054"},"modified":"2017-07-27T09:17:33","modified_gmt":"2017-07-27T01:17:33","slug":"broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets-exodus-intelligence","status":"publish","type":"post","link":"https:\/\/tongwing.woon.sg\/blog\/broadpwn-remotely-compromising-android-and-ios-via-a-bug-in-broadcoms-wi-fi-chipsets-exodus-intelligence\/","title":{"rendered":"Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom\u2019s Wi-Fi Chipsets | Exodus Intelligence"},"content":{"rendered":"<p>An impressively detailed start-to-end explanation of how an exploit is created. This exploit is unusually powerful in that it does not require the user to perform any action &#8211; no need to open attachments, click on hyperlinks etc. The only requirement is that Wifi is turned on. For iOS users, this exploit has been patched in the latest iOS 10.3.3.<\/p>\n<p><a href=\"https:\/\/blog.exodusintel.com\/2017\/07\/26\/broadpwn\/\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/tongwing.woon.sg\/blog\/wp-content\/uploads\/2017\/07\/test4nitay.png\" alt=\"\" \/><\/a><\/p>\n<blockquote><p>Broadpwn is a fully remote attack against Broadcom\u2019s BCM43xx family of WiFi chipsets, which allows for code execution on the main application processor in both Android and iOS. It is based on an unusually powerful 0-day that allowed us to leverage it into a reliable, fully remote exploit.<\/p><\/blockquote>\n<p>Source: <em><a href=\"https:\/\/blog.exodusintel.com\/2017\/07\/26\/broadpwn\/\">Broadpwn: Remotely Compromising Android and iOS via a Bug in Broadcom\u2019s Wi-Fi Chipsets | Exodus Intelligence<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An impressively detailed start-to-end explanation of how an exploit is created. This exploit is unusually powerful in that it does not require the user to perform any action &#8211; no need to open attachments, click on hyperlinks etc. The only requirement is that Wifi is turned on. For iOS users, this exploit has been patched [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1054"}],"collection":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/comments?post=1054"}],"version-history":[{"count":1,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1054\/revisions"}],"predecessor-version":[{"id":1056,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/posts\/1054\/revisions\/1056"}],"wp:attachment":[{"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/media?parent=1054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/categories?post=1054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tongwing.woon.sg\/blog\/wp-json\/wp\/v2\/tags?post=1054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}