PS5 4.03 Kernel Exploit
This repo contains an experimental WebKit ROP implementation of a PS5 kernel exploit based on TheFlow's IPV6 Use-After-Free (UAF), which was reported on HackerOne. The exploit strategy is for the most part based on TheFlow's BSD/PS4 PoC with some changes to accommodate the annoying PS5 memory layout (for more see Research Notes section). It establishes an arbitrary read / (semi-arbitrary) write primitive. This exploit and its capabilities have a lot of limitations, and as such, it's mostly intended for developers to play with to reverse engineer some parts of the system.
Also note; stability is fairly low, especially compared to PS4 exploits. This is due to the bug's nature of being tied to a race condition as well as the mitigations and memory layout of the PS5. This document will contain research info about the PS5, and this exploit will undergo continued development and improvements as time goes on.
This could possibly work on 4.50 as well via substituting valid 4.50 gadget offsets + kernel slides, but that will be for future work.
Those interested in contributing to PS5 research/dev can join a discord I have setup here.
- Obtains arbitrary read/write and can run a basic RPC server for reads/writes (or a dump server for large reads) (must edit your own address/port into the exploit file on lines 673-677)
- Enables debug settings menu (note: you will have to fully exit settings and go back in to see it).
- Gets root privileges
- This exploit achieves read/write, but not code execution. This is because we cannot currently dump kernel code for gadgets, as kernel .text pages are marked as eXecute Only Memory (XOM). Attempting to read kernel .text pointers will panic!
- As per the above + the hypervisor (HV) enforcing kernel write protection, this exploit also cannot install any patches or hooks into kernel space, which means no homebrew-related code for the time being.
- Clang-based fine-grained Control Flow Integrity (CFI) is present and enforced.
- Supervisor Mode Access Prevention/Execution (SMAP/SMEP) cannot be disabled, due to the HV.
- The write primitive is somewhat constrained, as bytes 0x10-0x14 must be zero (or a valid network interface).
- The exploit's stability is currently poor. More on this below.
- On successful run, exit the browser with circle button, PS button panics for a currently unknown reason.
How to use
Configure fakedns via
manuals.playstation.netto your PCs IP address
Run fake dns:
python fakedns.py -c dns.conf
Run HTTPS server:
Go into PS5 advanced network settings and set primary DNS to your PCs IP address and leave secondary at
- Sometimes the manual still won't load and a restart is needed, unsure why it's really weird
- Go to user manual in settings and accept untrusted certificate prompt, run
- Optional: Run rpc/dump server scripts (note: address/port must be substituted in binary form into exploit.js).
Fix-up sockets to exit browser cleanly (top prio)
Write some data patches (second prio)
Enable debug settings
Patch creds for uid0
- Jailbreak w/ cr_prison overwrite
- Improve UAF reliability
- Improve victim socket reliability (third prio)
- Use a better / more consistent leak target than kqueue
Using RPC and Dumping Kernel .data
RPC is a very simple and limited setup.
- Edit your IP+port (if changed) into exploit.js.
Run the server via
python rpcserver.py, allow the PS5 to connect when the exploit finishes. The PS5 will send the kernel .data base address in ASCII and you can then send read and write commands. Example is below.
[RPC] Connection from: ('10.0.0.169', 59335) [RPC] Received kernel .data base: 0x0xffffffff88530000 > r 0xffff81ce0334f000 42 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 > w 0xffff81ce0334f004 0x1337 Wrote qword.
This setup is somewhat jank and a better system will be in place soon.
- Edit your IP+port (if changed) into exploit.js.
- Comment the RPC code in exploit.js and uncomment dumper code.
Run the server via
python dumpserver.py, allow the PS5 to connect and start dumping when exploit finishes. It will continue to dump data from the kernel base until it panics due to hitting unmapped memory. Note: read is somewhat slow at ~200kbps, so it may take 10 minutes or so to complete.
This exploit works in 5 stages, and for the most part follows the same exploit strategy as theflow's poc.
Trigger the initial UAF on
ip6_pktoptsand get two sockets to point to the same
pktopts/ overlap (master socket <-> overlap spray socket)
pktoptson the master socket and fake it with an
ip6_rthdrspray containing a tagged
Infoleak step. Use
rthdroverlap to leak a kqueue from the 0x200 slab and
pktoptsfrom the 0x100 slab.
Arbitrary read/write step. Fake
pktoptsagain and find the overlap socket to use
IPV6_RTHDRas a read/write primitive.
- Cleanup + patch step. Increase refcount on corrupted sockets for successful browser exit + patch data to enable debug menu and patch ucreds for uid0.
Stability for this exploit is at about 30%, and has multiple potential points of failure. In order of observed descending liklihood:
- Stage 1 causes more than one UAF due to failing to catch one or more in the reclaim, causing latent corruption that causes a panic some time later on.
- Stage 4 finds the overlap/victim socket, but the pktopts is the same as the master socket's, causing the "read" primitive to just read back the pointer you attempt to read instead of that pointer's contents. This needs some improvement and to be fixed if possible because it's really annoying.
- Stage 1's attempt to reclaim the UAF fails and something else steals the pointer, causing immediate panic.
- The kqueue leak fails and it fails to find a recognized kernel .data pointer.
- Leaving the browser through "unusual" means such as PS button, share button, or browser crash, will panic the kernel. Needs to be investigated.
- It appears based on various testing and dumping with the read primitive, that the PS5 has reverted back to 0x1000 page size compared to the PS4's 0x4000.
- It also seems on PS5 that adjacent pages rarely belong to the same slab, as you'll get vastly different data in adjacent pages. Memory layout seems more scattered.
- Often when the PS5 panics (at least in webkit context), there will be awful audio output as the audio buffer gets corrupted in some way.
- Sometimes this audio corruption persists to the next boot, unsure why.
- Similar to PS4, the PS5 will require the power button to be manually pressed on the console twice to restart after a panic.
- It is normal for the PS5 to take an absurd amount of time to reboot from a panic if it's isolated from the internet (unfortunately). Expect boot to take 3-4 minutes.
Contributors / Special Thanks
- Andy Nguyen / theflow0 - Vulnerability and exploit strategy
- ChendoChap - Various help with testing and research
- Znullptr - Research/RE
- sleirsgoevy - Research/RE + exploit strat ideas
- bigboss - Research/RE
- flatz - Research/RE + help w/ patches
- zecoxao - Research/RE
- SocracticBliss - Research/RE
- laureeeeeee - Background low-level systems knowledge and assistance
An experimental webkit-based kernel exploit (Arb. R/W) for the PS5 on 4.03FW
There are no comments to display.
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!Register a new account
Already have an account? Sign in here.Sign In Now