PS4/PS5: TheFloW discloses Kernel vulnerability relying on old bug from 2006, impacts PS4 up to 11.00 & PS5 up to 8.20, more details in May
A few months ago, I wrote about a rumor that TheFloW‘s yet-to-be-disclosed PS4/PS5 Kernel exploit was relying on an 18 year old vulnerability. What sounded like an obvious troll initially, then looked more and more like an actual crash, has turned out to be the real deal. TheFloW has confirmed a few hours ago that the Kernel exploit does indeed rely on a 2006 CVE. He has linked to a HackerOne report that contains details on the vulnerability (disclosure), but not on full exploitation.
TL,DR: if you’re on PS4 11.00 or below, and/or on PS5 8.20 or below, you’ll want to stay put, a kernel exploit is most likely coming.
PS4 11.00 / PS5 8.20 Kernel exploit incoming
Hacker TheFloW has just confirmed that he leveraged a critical vulnerability from 2006 (CVE-2006-4304) in order to gain kernel access to both the PS4 and PS5. He will present the exploit at the TyphoonCon security conference, in a few weeks. But he’s already given some details of the vulnerability in a lengthy report on Sony’s bug bounty program on HackerOne.
TheFloW has been an insane source of exploits and vulnerability disclosures for PlayStation devices, dating back to his early days on the PSP (when he was known as Total_Noob). Back then, the scene as a whole, Total_Noob included, was a bit reckless, and hack releases felt a bit more simple. Nowadays, a lot of hackers keep things under wraps, and the rare ones like TheFloW who do release their work, go through a more “responsible” route, leveraging Sony’s bug bounty program.
What the CVE is about:
Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before 20060902 allows remote attackers to cause a denial of service (panic), obtain sensitive information, and possibly execute arbitrary code via crafted Link Control Protocol (LCP) packets with an option length that exceeds the overall length, which triggers the overflow in (1) pppoe and (2) ippp.
From TheFloW’s report:
A malicious PPPoE server can cause denial-of-service or potentially remote code execution in kernel context on the PS4/PS5.
At [1], it is possible to set len to a length between 0 and 5. Thus, at [2] len – 6 can have a negative length between -6 and -1. As such, the checks for name_len and passwd_len can be bypassed, and it is possible to have lengths up to 255 bytes. As a consequence, at [3] it is possible to read out-of-bounds from the mbuf when comparing the name and password with memcmp(). Since different responses are returned back based on the comparison, an attacker might be able to use this as a an oracle to leak the out-of-bounds data (by setting the name and secret beforehand). This could be used to leak pointers and defeat KASLR remotely.
PS4 11.00 and PS5 8.20 Jailbreak – ETA WEN?
Long story short, we’re generally getting the exploits ultimately, but not before PlayStation have had some time to look into them and patch them on their consoles. Hence, we already know the exploits have been patched in PS4 11.02 and PS5 8.40.
The fact that we’re getting this disclosure doesn’t mean a Jailbreak is right around the corner. In recent history, the hacker has not done a full release himself for his exploits, but instead has given the scene enough details to create a working Jailbreak, which can sometimes take months. I would expect things to be similar this time. In this case, the details on the hackerOne bounty seem to be enough to trigger a denial-of-service (aka a crash or kernel panic), but do not give the specific on how to craft the attack in a way to actually do more than a crash. With that being said, there are lots of details in there already (and explicit “this part could leak data” sections), so I would expect other hackers to actively be looking into TheFloW’s report already.
Since the scene has basically known about this exploit collectively for a few months now, some Proof of Concept code has been circulating already (example here from D-Link turtle). How easily those examples can be adapted based on new information from the report, is something we still have to see.
TheFloW has stated he will demonstrate successful exploitation during his presentation at TyphoonCon in May, but not whether he will give more technical details on the actual exploitation.
In other words, if you’re on PS4 11.00 (or below) and/or on PS5 8.20 (or below), stay put. Now we play the waiting game, and hope that either TheFloW discloses more information, or that other hackers figure it out based on what he’s revealed already.
Source: TheFloW
Note: as always with this type of article, I’ve done my best to be as accurate as possible, but information on the topic is complex and evolves very rapidly. If you spot a mistake or inaccuracy, let me know in the comments below. Thanks!
I hope dad ps5 will be never broken
but its already broken since years
I doubt they will break your Dad’s PS5.
Do we have a WebKit exploit for those firmwares that reach 11 and 8.2? I presume yes, but some confirmation would be nice. And great news!
The kernel exploit, if what I am reading is correct, doesn’t need a Webkit or Userland exploit at all, after the exploit is run, it instantly reached RCE status and you can reach the Kernel directly
This is user + kernel. You initiate it by trying to connect to a malicious server using the PPPoE protocol.
i think thee xploit just need ethernet port and system settings set to PPPoE. so we don need webkit??
Won’t need one for this exploit..
Won’t need one for this exploit..
Recommended FW: 4.03
Highest kernel exploit: 4.51
KEX offsets found: 3.00-4.51
Highest webkit entrypoint: 5.50
Mast1C0re entrypoint: 6.50 (PS2 brew)
BD-JB entrypoint: 7.61
HEN: etaHEN latest HERE
PS5 backup loading: Itemzflow for 3.XX-4.5X HERE
PS4 backup loading: FPKG Enabler 3.XX-4.5X (rest mode & backports work, can crash).
Spoofing: 9.99
(Higher FW games won’t run without backport patch. Also breaks FW detection)
PS5debug released: HERE
PS5 trainers/cheats: Work
PS5 dumper: 3.XX-4.5X works with most games, use Itemzflow
(Dumps need rebuilding/cracking to avoid crashing)
Full chain exploit: Not public (2.XX by FlatZ)
PSN access: NEVER
This shouldn’t need one
Afaik we don’t need a webkit exploit for the kernel exploit to function as we exploit the kernel via Ethernet
This bug doesn’t require Webkit exploit
TheFlow is great, can’t wait for PS4 release. hope it happen. youre MY Saviour
This man is unbelievable. I’m using PS5 Digital on FW 4.05 with his previous kexploit.
My other PS5 Disc Version has been patiently waiting on FW 6.50.
Some time ago I’ve bought Blu-Ray Disc Recorder especially for this event – I feel FW 7.61 is approaching my Disc PS5 within next months.
Long live TheFlow!
finally staying on 8 paying off
At 8.0 at the moment 🙂
I bought a ps5 for this exact exploit.
Let’s go!!!!
Time to rise and shine for my ps5 7.40 sitting almost 2 years lol and got a bunch of ps4 10.50
Time to rise and shine for my ps5 7.40 sitting almost 2 years lol and got a bunch of ps4 10.50
Sadly, by the time they release something meaningful everybody can use, the time of the PS5 will be over…
I hope 11.02 is a part of this exploit but i think it’s not going to be a hackable version of system
What PS5 models or bundles come with the 8.2 or lower firmware?
Finally not turning on my PS5 from 6.71 fw ver will be rewarded.
Does this vulnerability affect the ps3 and ps vita as well?
Recommended FW: 4.03
Highest kernel exploit: 4.51
KEX offsets found: 3.00-4.51
Highest webkit entrypoint: 5.50
Mast1C0re entrypoint: 6.50 (PS2 brew)
BD-JB entrypoint: 7.61
HEN: etaHEN latest HERE
PS5 backup loading: Itemzflow for 3.XX-4.5X HERE
PS4 backup loading: FPKG Enabler 3.XX-4.5X (rest mode & backports work, can crash).
Spoofing: 9.99
(Higher FW games won’t run without backport patch. Also breaks FW detection)
PS5debug released: HERE
PS5 trainers/cheats: Work
PS5 dumper: 3.XX-4.5X works with most games, use Itemzflow
(Dumps need rebuilding/cracking to avoid crashing)
Full chain exploit: Not public (2.XX by FlatZ)
PSN access: NEVER
Wololo, is it possible to bring back the jailbreak method for 5.05 on 9.00 using this new RCE ???
gta netflix, app iphone 8 plus ports
Thanks for your enlightening contribution to the internet’s vast sea of wisdom. Your insightful commentary truly adds depth to the ongoing discourse on PS5 jailbreaks, sparking joy in all who encounter it.
Genshin Impact… 😀
things are getting better all the time!
I have a 3.0 PS5 still laying in wait for a reason to bring it out and I always wanted a new white PRO ps4 but wasnt sure if it was hackable