Samsung reportedly shipped millions of phones with flawed encryption

Samsung Galaxy S21 FE
(Image credit: Peter Hoffmann)

Some of the top Samsung flagship smartphones were being shipped with a major security flaw that could allow threat actors “trivial decryption” of secret, encrypted keys, experts have warned.

Overall, around 100 million devices are thought to have been at risk, including flagship devices such as the Samsung Galaxy S21 and S20 models, along with older top-end smartphones including the S8, S9 and S10.

The flaw was discovered by a group of cybersecurity researchers, Alon Shakevsky, Eyal Ronen, and Avishai Wool, from the Tel Aviv University in Israel. Their work resulted in the establishment of multiple vulnerabilities, including CVE-2021-25444 and CVE-2021-25490, as well as their subsequent patching, by October 2021. 

TechRadar needs you!

We're looking at how our readers use VPNs with different devices so we can improve our content and offer better advice. This survey shouldn't take more than 60 seconds of your time. Thank you for taking part.

>> Click here to start the survey in a new window <<

Poorly implemented encryption

Here are the flaw’s details, described as briefly as possible:

Sensitive secondary functions on virtually all Android smartphones are separated from “normal” Android applications, through what’s known as Trusted Execution Environment (TEE), supported by Arm’s TrustZone technology. TEE basically runs its own operating system, called TrustZone Operating System (TZOS), while individual vendors decide whether or not to implement cryptographic functions within the OS.

At the same time, there’s the Android Keystore, offering hardware-backed cryptographic key management through the Keymaster Hardware Abstraction Layer (HAL), which Samsung implemented through Keymaster TA - a Trusted Application on TrustZone.

This gives Samsung phones the ability to use TEE crypto calculations in other apps that operate on Android. 

The cryptographic keys, or blobs, stored by the Keymaster TA, are encrypted via AES-GCM and stored in the Android file system. The trouble is - while these should only be readable within the TEE, in practice - that’s not the case. 

Samsung implemented Keymaster TA poorly in S8, S9, S10, S20, and S21, allowing researchers to reverse-engineer the Keymaster app and get the keys from the hardware-protected key blobs. 

Commenting on the findings on Twitter, associate professor of computer science at the Johns Hopkins Information Security Institute, Matthew Green, said Samsung could have derived a different key-wrapping key for each key they protect. “But instead Samsung basically doesn’t. Then they allow the app-layer code to pick encryption IVs. This allows trivial decryption,” he said.

Samsung has yet to comment on the findings, but TechRadar Pro has approached the company for comment. 

Via: The Register

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A smartphone on a sofa showing the WhatsApp, Telegram and Signal apps
RCS encryption is still months away following major US telecomms breach
an image of the Samsung Galaxy S24 Ultra
Samsung pulls curtains on classified operation called Project Infinity, where teams compete relentlessly to improve security on billions of Galaxy phones
A padlock image floating over a smartphone.
Best secure smartphones of 2025
MediaTek
MediaTek reveals host of security vulnerabilities, so patch now
Bluetooth
Top Bluetooth chip security flaw could put a billion devices at risk worldwide
Samsung Galaxy S24 Ultra
Some Samsung Galaxy S24 Ultra screen coatings are wearing out – and it's not a good look
Latest in Security
An American flag flying outside the US Capitol building against a blue sky
The FCC is creating a security council to bolster US defenses against cyberattacks
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Ransomware
Microsoft uncovers sleuthy new XCSSET MacOS malware campaign
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Meta warns of worrying security flaw hitting open source type software
Hand holding smartphone and scan fingerprint biometric identity for unlock her mobile phone
Biometrics add another layer of security to passwordless authentication
Data leak
Hacked Tata Technologies data leaked by ransomware gang
Latest in News
An image of the Samsung Galaxy S25 Ultra from a hands-on event
Samsung Galaxy S26 Ultra could resurrect an intriguing camera feature
Cristin Milioti in Black Mirror season 7
Netflix launches trailer for Black Mirror season 7, giving us a look at its first-ever sequel episode and an unexpected returning character
A graphic of the PC Gaming Show
Get ready for a bounty of PC games on June 8, as the PC Gaming show is back
A close up of The Daily podcast from Pocket Casts&#039; web page
‘Podcasting shouldn’t be locked behind walled gardens’: Pocket Casts slams Spotify and makes its web player free to all
A smartphone on a sofa showing the WhatsApp, Telegram and Signal apps
Forget AI – WhatsApp is planning a simple messages feature that could be its most useful upgrade in years
NordicTrack Ultra 1
The new NordicTrack Ultra 1 treadmill looks like it was designed by an architect and costs $15,000