{"id":136478,"date":"2026-03-16T09:18:06","date_gmt":"2026-03-16T09:18:06","guid":{"rendered":"https:\/\/www.europesays.com\/ro\/136478\/"},"modified":"2026-03-16T09:18:06","modified_gmt":"2026-03-16T09:18:06","slug":"un-exploit-qualcomm-permite-deblocarea-bootloader-pe-flagship-urile-android","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/ro\/136478\/","title":{"rendered":"Un exploit Qualcomm permite deblocarea bootloader pe flagship-urile Android"},"content":{"rendered":"<p>Se pare c\u0103 o nou\u0103 vulnerabilitate Qualcomm GBL afecteaz\u0103 SoC-urile Qualcomm, \u00een special cel mai recent procesor Snapdragon 8 Elite Gen 5. Aceasta permite deblocarea bootloader-ului pe telefoanele emblematice care anterior erau dificil de deblocat. <\/p>\n<p>Un exploit Qualcomm deblocheaz\u0103 bootloader-ele<\/p>\n<p>Aceast\u0103 vulnerabilitate pare s\u0103 afecteze to\u021bi produc\u0103torii de echipamente originale, cu <a href=\"https:\/\/www.connect.ro\/2025\/07\/28\/oneui-8-de-la-samsung-nu-mai-permite-deblocarea-bootloader-ului\/\" target=\"_blank\" rel=\"nofollow noopener\">excep\u021bia Samsung<\/a>, care folose\u0219te propriul S-Boot \u00een loc de ABL-ul Qualcomm.<\/p>\n<p>Se pare c\u0103 noul exploit Qualcomm GBL a circulat <a href=\"https:\/\/www.androidauthority.com\/qualcomm-snapdragon-8-elite-gbl-exploit-bootloader-unlock-3648651\/\" target=\"_blank\" rel=\"nofollow noopener\">\u00een ultimele zile<\/a>. Acesta vizeaz\u0103 o omisiune \u00een modul \u00een care GBL (Generic Bootloader Library) se \u00eencarc\u0103 pe smartphone-urile Android cu SoC-uri Qualcomm. Pe scurt, Android Bootloader (ABL) specific furnizorului Qualcomm \u00eencearc\u0103 s\u0103 \u00eencarce GBL din parti\u021bia \u201eefisp\u201d de pe telefoanele care ruleaz\u0103 Android 16.<\/p>\n<p>\u00cen acest proces, Qualcomm ABL verific\u0103 pur \u0219i simplu prezen\u021ba aplica\u021biei UEFI \u00een parti\u021bia respectiv\u0103, \u00een loc s\u0103 verifice autenticitatea acesteia ca GBL. Aceast\u0103 omisiune permite \u00eenc\u0103rcarea codului nesemnat pe parti\u021bia efisp, care este executat f\u0103r\u0103 verificare. Aceasta formeaz\u0103 baza exploit-ului Qualcomm GBL.<\/p>\n<p>\u00cen mod implicit, scrierea pe parti\u021bia efisp nu este posibil\u0103 deoarece SELinux ruleaz\u0103 \u00een modul Enforcing, care blocheaz\u0103 ac\u021biunile nepermise. Pentru a activa accesul la scriere, SELinux trebuie s\u0103 fie setat \u00een modul Permissive, care necesit\u0103 privilegii de root. Cu toate acestea, ave\u021bi nevoie de Permissive SELinux pentru a debloca bootloader-ul prin exploit-ul GBL \u0219i a ob\u021bine acces root. Se pare c\u0103 aici intervine o alt\u0103 vulnerabilitate.<\/p>\n<p>ABL-ul Qualcomm include o comand\u0103 fastboot, \u201efastboot oem set-gpu-preemption\u201d, care accept\u0103 0 sau 1 ca prim parametru. Cu toate acestea, comanda pare s\u0103 accepte, de asemenea, \u00een mod neinten\u021bionat, argumente de intrare f\u0103r\u0103 nicio verificare sau igienizare, permi\u021b\u00e2ndu-v\u0103 s\u0103 ad\u0103uga\u021bi parametri personaliza\u021bi \u00een linia de comand\u0103. Aceasta, la r\u00e2ndul ei, este utilizat\u0103 pentru a ad\u0103uga parametrul \u201eandroidboot.selinux-permissive\u201d \u0219i a comuta SELinux de la Enforcing la Permissive. Comanda \u201efastboot set-gpu-preemption 0 androidboot.selinux=permissive\u201d comut\u0103 \u00een mod surprinz\u0103tor SELinux la Permissive.<\/p>\n<p>Pe seria <a href=\"https:\/\/www.connect.ro\/2026\/02\/28\/lansare-xiaomi-17-specificatii-preturi\/\" target=\"_blank\" rel=\"nofollow noopener\">Xiaomi 17<\/a>, exploit-ul leag\u0103 \u00eempreun\u0103 serviciul de binder IMQSNative al aplica\u021biei MQSAS (MIUI Quality Service and Secure) din HyperOS \u0219i permisiunile sale la nivel de sistem pentru a scrie o aplica\u021bie UEFI personalizat\u0103 pe parti\u021bia efisp. Dup\u0103 o repornire, ABL \u00eencarc\u0103 aceast\u0103 aplica\u021bie UEFI personalizat\u0103 f\u0103r\u0103 verificare, datorit\u0103 exploit-ului GBL.<\/p>\n<p>Nu este clar dac\u0103 exploit-ul GBL poate func\u021biona \u0219i pe alte SoC-uri Qualcomm \u00een afar\u0103 de Snapdragon 8 Elite Gen 5. Cu toate acestea, din moment ce Android 16 introduce GBL, probaibl nu merge pe sistemele de operare mai vechi. \u00cen plus, exploit-ul GBL ar trebui s\u0103 afecteze to\u021bi produc\u0103torii de echipamente originale (OEM), cu excep\u021bia Samsung, care folose\u0219te propriul S-Boot \u00een loc de ABL-ul Qualcomm.<\/p>\n","protected":false},"excerpt":{"rendered":"Se pare c\u0103 o nou\u0103 vulnerabilitate Qualcomm GBL afecteaz\u0103 SoC-urile Qualcomm, \u00een special cel mai recent procesor Snapdragon&hellip;\n","protected":false},"author":2,"featured_media":136479,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[274,1829,2443,41,40,38,39,141,124],"class_list":{"0":"post-136478","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tehnologie","8":"tag-android","9":"tag-flagship","10":"tag-qualcomm","11":"tag-ro","12":"tag-romana","13":"tag-romania","14":"tag-romanian","15":"tag-technology","16":"tag-tehnologie"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@ro\/116238110081383834","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/posts\/136478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/comments?post=136478"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/posts\/136478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/media\/136479"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/media?parent=136478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/categories?post=136478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/ro\/wp-json\/wp\/v2\/tags?post=136478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}