• Home

Bootloader Slot Count Not Found Moto G4 Plus

 
Bootloader Slot Count Not Found Moto G4 Plus 4,5/5 6099 reviews

Now you can unlock bootloader easily by following this simple guide on How to Unlock Bootloader on Moto G4 Play. Official Bootloader Unlock for Moto G4 Play will also void the device warranty. So if you planning to unlock bootloader on Moto G4 Play, then it’s always better to wait until your warranty gets over. Iam not able to run this command fastboot oem config bootmode ' fastboot oem fbmodeclear fastboot reboot (bootloader) slot-count: not found (bootloader) slot-suffixes: not found (bootloader) slot-suffixes: not found. OKAY 0.170s finished. Total time: 0.173s. OEM Unlocking on Android is an option in the device’s Developer Options settings that needs to be enabled in order to unlock the bootloader. It was first introduced by Google in Android 5.0 Lollipop and is also sometimes referred to as “OEM Unlock”.

In USENIX WOOT ‘17, that took place earlier this month in Vancouver, we presented our paper, “fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations”, covering a year’s work in Android bootloaders research.

Our paper also includes some previously undisclosed details on CVE-2016-10277, a critical kernel command-line injection vulnerability in the Motorola Android Bootloader (ABOOT) that we had found and blogged about.

In the previous couple of blog posts, we demonstrated a tethered unrestricted root exploit against that vulnerability, that we later extended to other Moto devices - G4 & G5. Additional Moto devices have also been confirmed by the community.

In the WOOT’17 paper we describe a natural continuation of that exploit – a second stage untethered secure boot & device locking bypass (tested to be working on the vulnerable versions of Nexus 6, Moto G4 & G5). Moreover, we also present in the paper and this blog post other second stage exploits, such as persistent kernel code execution in Nexus 6, the ability to downgrade critical partitions (such as the bootloaders chain and TrustZone), unlocking a re-locked Nexus 6 bootloader, and more.

As usual, our PoC exploit is publicly available in our GitHub repo.

DISCLAIMER: Unlike the previous ephemeral jailbreak, the one presented today may brick your device. For example, during the development of it, we had to unlock our (luckily unlockable!) Moto G5 device in order to unbrick it.

Table of Contents

  1. Other Second-stage Exploits
    – Persistent Kernel Code Execution on Nexus 6
    – Unlocking a Re-locked Nexus 6 device from Platform OS
    – Downgrade of Critical Partitions
    – Modifying the system partition (Moto G4 and others)

Recap of the Vulnerability and the Tethered-jailbreak

  1. Vulnerable versions of the Motorola Android Bootloader (ABOOT) allow for kernel command-line injection.
  2. Using a proprietary fastboot OEM command, only available in the Motorola ABOOT, we can inject, through USB, a parameter named initrd which allows us to force the Linux kernel to populate initramfs into rootfs from a specified physical address.
  3. We can abuse the ABOOT download functionality in order to place our own malicious initramfs at a known physical address, named SCRATCH_ADDR (see here for a list of devices).
  4. Exploiting the vulnerability allows the adversary to gain unconfined root shell.
  5. Since the initramfs payload is injected into RAM by the adversary, the vulnerability must be re-exploited on every reboot.

For example, here is a successful run of the exploit on cedric (Moto G5)

Persisting the Payload

Making an untethered exploit implies that we must somehow persist our payload. In general, although we have block-device write access with the unconfined root shell, due to Verified Boot we cannot make the system load with a tampered boot or system partitions.

It turns out, however, that our Moto devices have some unused partition we can populate our malicious initramfs into:

In addition, as was also suggested by Ethan Nelson-Moore, attackers can use the SD card partition (mmcblk1p1), if the device has one (shamu doesn’t, for example). Obviously, using the SD card does not require the first stage ephemeral exploit, as one can prepare it offline. It should be noted that a significant drawback of targeting SD cards, from the adversary perspective, is that it implies a physical attack only (unless the adversary targets a device with an already inserted SD card).

Owning the Unused Partition

The first step is to create an empty ext4 partition. At the host:

The next step is to populate the malicious initial ramdisk archive into the in-file ext4 filesystem. This can be done either on the host or on the device.On the device, one can replace the unused partition with the empty ext4 filesystem we have just created, mount it, and use cpio to populate the malicious initramfs. The attacker should also restore the SELinux contexts, and create the /sbin/init -> /init symbolic link – see the next section for more details.

The target partition now has the payload. It can be saved for later use on other devices (of the same model), i.e.

On other devices, populating it is now trivial:

Please note that the persisted payload may need some extra-massaging. For example, in order to overcome the tight size limitation of the cedric unused partition, we packed the binaries of the malicious initramfs (using UPX). In shamu, we had to a priori create some directories (/firmware, /persist), which are probably made by an init script. (This cannot happen on our readonly mounted root partition.)

Since we populated our malicious initramfs archive in some unused partition, we still need to lure Linux to use it as the root partition.

Forcing Linux to Use Our root Partition

Leaving many details behind, Linux prepares the root filesystem as follows (taking into account the Moto kernels config).

  1. It unpacks an internal initramfs to rootfs.
  2. It tries to populate a bootloader-supplied initramfs from a physical address (initrd_{start,end}), specified in the Device-Tree Blob (DTB). In ARM/64 that can also be specified in the kernel command line by the initrd argument. We abuse this functionality with the tetherd exploit.
  3. If it fails, it reverts to an older initrd mechanism, copying from initrd_start into /initrd.image under rootfs.
  4. It tries to access ramdisk_execute_command with a default value of /init (which can be overridden by specifying rdinit on the kernel command line) on rootfs. If it succeeds, it will soon execute it and we are done. This is the normal flow on regular boots.
  5. It will try to load /initrd.image from rootfs into /dev/ram0 unless the noinitrd argument is specified. It will then execute /linuxrc unless the ‘real’ root device is /dev/ram0.
  6. If a root argument is specified, the kernel will mount it (read only, unless the rw argument is specified) as the root filesystem.
  7. If execute_command is specified (by the init argument), the kernel will eventually execute it. If it succeeds, we are done.
  8. The kernel will try to execute /sbin/init, /etc/init, /bin/init, /bin/sh in order until it succeeds, and panic otherwise.

We can thus conclude that the adversary can coerce Linux to use our tampered partition (e.g. /dev/block/bootdevice/by-name/padC) as the root partition by supplying the following arguments:

  1. Bogus initrd, or rdinit= parameters in order to make the kernel fail on (2), (3) and (4).
  2. root=/dev/<real block name> to use our owned partition.
  3. rw. Optional. Only required for the factory initramfs archive if we do not restorecon. (See above.)
  4. init=/init. Optional. Only required if we do not create the /sbin/init symbolic link in the root partition. (See above.)

Hence, the minimum number of bytes which are needed to inject into the cmdline is 29-30 (depending on the partition). For example, on cedric, the fastboot command would be:

fastboot oem fsg-id 'a rdinit= root=/dev/mmcblk0p48'

Luckily (although we can also overcome this limitation, see next), ABOOT limits the string length of fsg-id parameter to 32 bytes before injecting it into the kernel command-line, so although we do not have much leeway with this UTAG, we managed to fit our payload in!

Putting it all Together: From shell user to untethered root

Kernel Command-line Injection from Platform OS

Bootloader

Before we created this very succinct payload (29-30 bytes), we had thought we wouldn’t be able find a payload that fit in the fsg-id UTAG. For instance, we incorrectly asserted that we would need to provide the rw and init arguments. We soon realized that by using initroot as a first stage exploit, we could cause ABOOT to inject another string into the kernel cmdline, which was much more spacious (256 bytes).

More importantly, what described next is independent of CVE-2016-10277 (in contrast to the previous payload), so if the adversary manages to gain a block-device access (with or without CVE-2016-10277), he can achieve a persistent root.

Kernel Command-line Overlay: cmdl

Interestingly, in our Moto devices (and also Nexus 6!) there is one UTAG which has caught our attention (in shamu this command will fail, although the UTAG is supported):

Bootloader Slot Count Not Found Moto G4 Plus Size

While very appealing, unfortunately this UTAG cannot be controlled from fastboot on production devices:

It’s a pity, because decompiling ABOOT!update_cmdline with IDA shows that this UTAG is limited to 256 bytes, more than enough of what we initially needed:

But can we use our block-device access (as we can achieve with the first stage initroot exploit) in order to control that UTAG?

Bootloader Slot Count Not Found Moto G4 Plus Specs

Accessing the UTAGs Block Device

As explained above, using the unrestricted root we achieve with initroot, we can write on arbitrary block devices (which are not write-protected).The UTAGs reside under a device-specific partition:

Let’s examine one of them:

We can observe that our injected argument (fsg-id) is there. Basic understanding of the format can easily be achieved by just observing this sample:

  1. The UTAG name is specified alongside its type (e.g. fsg-id:str)
  2. At some offset from the start of UTAG, the number of data bytes are specified (0x1c at offset 0x4f)
  3. The data is placed at a specific offset from the start of the UTAG.

Equipped with this knowledge, we can add our malicious cmdl UTAG.

Since this partition is NOT write-protected, we can overwrite it even if we are not running in recovery mode: (Kudos to @autoprime – at the beginning I thought one must use initroot in recovery mode for that, albeit it’s also possible by simply selecting recovery mode on the fastboot menu, during exploitation – that’s how we managed to overwrite the system partition on old Moto devices such as athene).

We can see that we indeed managed to inject our own data into the non-fastboot accessible UTAG!Again, being able to control this UTAG allows for a persistent root, independently of CVE-2016-10277 (given that you have block-device access).

Other Second-stage Exploits

In addition to the generic second stage exploit depicted above, we also describe in the paper and the following sections additional attacks. (Some are device-specific.)

Persistent Kernel Code Execution on Nexus 6

During our disclosure process, Android Security also observed that on shamu, an unrestricted root (as we gain with the ephemeral initroot), or one that runs under an SELinux domain with block device access, can overwrite the bootloader chain, boot, and system partitions. Due to incomplete Secure/Verified Boot implementation (verified on our re-locked Nexus 6 device), the boot partition is not verified, which implies a persistent kernel code execution – by using the ephemeral initroot exploit, the attacker can completely replace the boot partition with a tampered one (which makes the aforementioned second-stage exploit on Nexus 6 redundant), containing a malicious kernel image and an initramfs cpio archive. Afterwards, the attacker can simply reboot into fastboot, and remove the malicious utag. The attacker’s supplied kernel code and initramfs will then be loaded on every boot.

Unlocking a Re-locked Nexus 6 device from Platform OS

Back in 2013, Dan Rosenberg found a vulnerability in the Motorola TrustZone kernel, allowing him to unlock the Motorola bootloader. In his blog, Dan depicted how Motorola implemented bootloader locking (also relevant for shamu), which can be summarized with the following state machine:

The transitions are as follows:

  1. The user first unlocks the device. The WARRANTYVOID qfuse is blown. This transition is governed by TEE thus it cannot be done from the Platform OS.
  2. User re-locks the device. Bootloader writes an entry under the sp partition, with an HMAC produced by TEE.
  3. User unlocks the device. Bootloader removes that entry.

Conclusion: An unrestricted root (as one could gain by exploiting CVE-2016-10277) can unlock a re-locked bootloader by invalidating the sp partition.

We tagged this vulnerability as A-62345923.

Downgrade of Critical Partitions

As mentioned above, by being able to write on block devices, one can overwrite the bootloader chain (SBL1, ABOOT), TrustZone and other signed partitions (e.g. boot & recovery). Although such a replacement succeeds, due to Secure Boot, the boot flow will end in the PBL’s Emergency Download Mode (EDL) (verified on shamu) or fastboot, depending on which partition has failed verification. Despite that, since older images are perfectly-signed ones, downgrade attacks are possible, unless mitigated using the SW_ID field. It seems that Nexus 6 does not increase the SW_ID field between bootloader versions, thus the attacker can downgrade those signed partitions, allowing for exploitation of now-patched vulnerabilities in critical code. Other Moto devices are not immune too – verified on athene (that uses a different signing format), we were able to downgrade SBL1, ABOOT and TrustZone:

Modifying the system partition (Moto G4 and others)

Due to secure boot, modifying the boot and recovery partitions on recent Motorola devices (such as athene & cedric) will cause the boot process to end in the fastboot mode. In order to achieve persistent code execution, the attacker, however, can aim at a different target – the system partition. Such a modification, however, is expected to be both prevented and detected by security controls. First, write-protection is enabled on the system partition (and others) by ABOOT upon boot. Unfortunately, this can be easily circumvented by the attacker by exploiting initroot slightly different – instead of instructing the bootloader to load the platform OS (by issuing fastboot continue), he can load the recovery OS, again, with the malicious initramfs injected into memory. Since the recovery OS needs write access on the system partition, the bootloader does not enable write-protection when booting into the recovery mode:

Then, the attacker can simply mount system and modify files. Sadly, although tampering with system can be detected by dm-verity, the fstab file under the Moto G4 boot image (and others), and in contrast to the G5 one, does not specify the verify attribute over the system partition. Controlling system allows the attacker to do much havoc. For example, the attacker now owns the Android runtime, can replace apps with malicious ones, can sideload privileged apps, and more.

Conclusion

In this blog we showed that having an ephemeral unrestricted root access is sufficient for achieving a persistent (untethered) jailbreak on affected Motorola devices. We demonstrated an end-to-end exploit for such devices, and also presented some other device-specific attacks.

Telephony

It depends on the region, but the Moto G4 comes in single and dual-SIM versions. We have a dual-SIM model for testing and it seems to be the most commonly found variety currently out there. Since it has a dedicated microSD card slot, you might as well get that one, as you never have to sacrifice the extra slot for memory expansion. We definitely count that as a plus with all the hybrid tray solutions floating around.

The dialer should be quite familiar. It's split into three tabs - favorites (with big thumbnails), call log and all contacts. There's no mention of Wi-Fi calling, however (even though previous Motos supported it), there's only SIP calling.

Bootloader Slot Count Not Found Moto G4 Plus Unlocked


Favorite contacts • Call log • All contacts

Like its generic sibling, the Moto G4 Plus also has a single speaker, but it's positioned on the front. While not exactly as good as a stereo front-facing setup, this is definitely better than a rear or bottom mounted one. The speaker is decently strong and got a Good mark. That's still below the Very Good that the 3rd generation Moto G got. While not the loudest, the G4 Plus offers a strong and clean sound for listening to music.

In terms of loudness, we got consistent results with those on the regular G4, which, of course, was expected.

Speakerphone testVoice, dBPink noise/ Music, dBRinging phone, dBOverall score
LG Nexus 5X61.265.861.7Below Average
Samsung Galaxy J5 (2016)66.064.370.1Below Average
Meizu m3 note66.564.671.7Average
Samsung Galaxy J7 (2016) 64.571.068.9Average
Samsung Galaxy A764.866.373.5Average
Oppo F1 Plus67.971.966.5Average
Huawei Honor 5X71.165.670.7Average
Moto G4 Plus64.070.473.0Average
Xiaomi Mi 566.967.274.0Good
Lenovo Moto G464.770.872.8Good
Xiaomi Redmi Note 464.267.276.9Good
Xiaomi Redmi Note 366.566.675.8Good
Oppo F1s69.072.067.9Good
vivo V3Max74.775.868.0Good
Huawei P9 lite66.071.583.2Very Good
Motorola Moto G 3rd Gen75.769.675.9Very Good
LeEco Le Max 274.969.377.2Very Good
Meizu MX575.773.579.5Excellent

Messaging and text input

The Moto G4 comes with Google Messenger pre-installed (it's the default SMS app) as well as Hangouts. Messenger behaves a lot like a modern IM app. You can snap a photo and send it in seconds or send short audio recordings, emojis and so on.


Google Messenger

However, unlike Hangouts it does not support Gmail chat or voice calling, video calling or anything that doesn't fit into MMS. Also, Google now has Allo and Duo for texting/video chats so figuring out which Google app you're supposed to use is a puzzle.

Text input, naturally, is handled by the Google keyboard. It's fast, it's accurate, it's reliable and it has plenty of configuration options. You can enable one-handed mode by long-pressing the comma key, adjust the keyboard height, the layout (e.g. you may want QWERTZ), enable additional symbols on long-press and change the theme. Typing, swiping and voice dictation are available.

Bootloader Slot Count Not Found Moto G4 Plus 64gb


Google keyboard • Swype input

Other apps

Since a near-stock Android experience is what Motorola has typically been after for some time now, there aren't many other pre-installed apps to speak of. You do get a calculator and Google's calendar app. But the latter is technically part of the standard Google app suite anyway.


Camera app • Google Calendar

However, Motorola arguably took things a bit too far in its strive to maintain a clutter-free experience. Then again, it might be sort of Google's fault for not having a standard Android file manager app to offer. Regardless, there is no real solution for outright browsing your files on the Moto G4 Plus. Sure, Google Photos is there and it has access to your local storage, but that is limited to images and videos alone. Furthermore, the Photos app seems to have trouble with quite a few video and audio codecs. But more on that later.

So, back to the point, Photos might have that part of the multimedia browsing covered and Google Play music has you covered for audio files. However, if you want to download or save and work with most other file types out there, you are pretty helpless out-of-the-box. All you get is the Downloads app, which is nothing more than a historical list.

Still, this is more of a nuisance more than anything else, since third party file browsers are plentiful, with some really, really good options available for free.