Fenrir MediaTek bl2_ext secure-boot bypass with EL3 code exe... #1473
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What it is
Fenrir is a PoC exploit-and-patching toolkit that compromises the secure boot chain on certain MediaTek-based phones by abusing a verification logic flaw. Confirmed targets include Nothing Phone (2a) “Pacman” (supported) and CMF Phone 1 “Tetris” (known working with incomplete support). The author also observed the issue on a Vivo X80 Pro.
Root cause and trust boundary
On affected devices, when the device’s bootloader configuration (<c...
🔧 Technical Details
Boot-chain verification bypass via bl2_ext policy patch
Abuse devices where Preloader skips verifying
bl2_ext
wheneverseccfg
is unlocked. Patchsec_get_vfy_policy()
inbl2_ext
to return0
so all downstream image verification is disabled. Becausebl2_ext
runs at EL3, the attacker controls loading of TEE, GenieZone, LK/AEE, and the Linux kernel, breaking the chain of trust across secure and non‑secure worlds.Integrity/attestation evasion by lock‑state spoofing
Modify the bootloader’s reported lock state so the device appears “locked” while actually unlocked. This helps pass strong integrity checks/attestations even when booting unsigned components; some environments may still require
vbmeta
adjustments.Runtime control through fastboot augmentation
Hook the bootloader to register custom fastboot commands, swit...
🤖 Agent Actions
I analyzed the repository, researched the PoC, and added a new focused page documenting the MediaTek bl2_ext verification bypass with EL3 code execution based on the Fenrir project. I also linked it from the most relevant existing firmware analysis/bootloader pages.
What I did:
New file created:
Internal references added:
Why here:
References used:
Changes applied as files:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.