Android Lock Screen Bypass Through Google Gemini
文章描述了一个严重的Android锁屏安全漏洞,该漏洞通过Google Gemini和键盘/Bixby的竞态条件实现锁屏绕过,允许未经授权访问Google账户、Gemini数据及连接应用。该漏洞影响Android 13至15版本,并在多款设备上复现。作者通过协调披露向Google报告并获得修复奖励。 2025-9-30 08:5:58 Author: payatu.com(查看原文) 阅读量:2 收藏

Introduction

Earlier this year, I discovered a critical security flaw in the Android Lock Screen that shocked even me when I first reproduced it. The vulnerability allowed lock screen bypass and unauthorised access to Google accounts, Gemini data, and even connected apps, all without requiring a PIN, password, or biometric input.

In this post, I will walk through:

  • How I discovered the bug
  • Steps to reproduce (in simplified terms)
  • Real-world abuse scenarios
  • My coordinated disclosure with Google
  • Key lessons for the security community

The Discovery

The bug emerged from a subtle race condition occurring between Bixby (Samsung’s assistant) and the on-screen keyboard navigation toggle. On non-Samsung devices, the same flaw could be triggered directly via Google Gemini assistant activation.

This revealed a serious oversight: Android 14’s lock screen protections could be bypassed through mere UI manipulation no malware, no rooting, no advanced exploitation.

Vulnerability Summary

Title: Lock Screen Bypass via Gemini & Keyboard/Bixby Race Condition
Impacted Platforms: Android 13, 14, 15 (reproduced on Samsung Galaxy S23 FE, Pixel 7 Pro, and likely other devices)
Severity: High / Critical

Exploitation Steps (simplified)

  1. Invoke the assistant on the lock screen
    • Samsung: Long-press Power → Bixby.
    • Pixel/Other: Long-press Power → Gemini.
  2. Trigger Race Condition (Samsung-only)
    • Rapidly alternate between the spacebar and the keyboard icon.
    • Gemini UI pops up before lock validation.

(Pixel and other Android devices: no race needed, direct Gemini popup already works)

  1. Gemini Interaction on Lock Screen
    • Type a message, then stop its response → Gemini context unlocked.
    • Now UI elements (flag/report, profile icon, etc.) are clickable despite the lockscreen.
  2. Privilege Escalation
    • Long press the flag button + tap profile icon → Switch/access all Google accounts on device.
    • Tap “+” plus chat icon simultaneously → Full Gemini chat history exposed.
    • Access Gemini settings → Enable options like “Make calls & send messages without unlocking”.
  3. Extended Exploits
    • Send WhatsApp/SMS/calls directly.
    • Interact with Gmail (compose drafts).
    • Export Gemini-generated reports to Drive/Docs, draining available storage.
    • Trigger Gemini Live → access camera & mic session from locked device.
    • Interact with Smart Home appliances via Gemini.

At this point, the phone is essentially “open” without ever touching the PIN/password.

Proof Of Concept (POC) :

Security Impact

The vulnerability impacted all three classic pillars of security (CIA):

  • Confidentiality: Private emails, Gemini history, contacts, and WhatsApp messages were exposed.
  • Integrity: Attackers could send messages, create Google Docs, or even interact with smart appliances.
  • Availability: By abusing Gemini’s content generation and export features, cloud storage quotas (such as Google Drive’s 15GB) can be quickly exhausted.

Coordinated Disclosure

I reported the issue to Google’s Vulnerability Reward Program (VRP) in March 2025. The coordination journey was constructive and collaborative, involving multiple follow-ups with Google’s Trust & Safety, Product Security, and Abuse teams.

The teams acknowledged the issue, filed it for remediation, and provided me with a generous reward as part of the program. More importantly, they ensured the flaw was addressed responsibly within the ecosystem.

Responsible Disclosure Timeline

  • Mar 20, 2025: Initial report filed.
  • Mar–Apr 2025: Triaged, confirmed, fully accepted.
  • Apr–Jun 2025: Additional abuse scenarios documented and validated.
  • Jul–Aug 2025: Acknowledgement, remediation process, and preparation for disclosure.
  • Sept 10, 2025: Public disclosure with PoC demonstration.

Conclusion

This vulnerability demonstrates how even simple input-handling flaws can erode core trust boundaries in mobile devices. A locked Android 14 phone was anything but secure, with Gemini effectively handing attackers a backdoor to sensitive data. Through constructive collaboration with Google’s VRP team, the vulnerability was acknowledged, and I received a fair monetary reward for the finding. Most importantly, fixes are being prioritised to prevent real-world exploitation.


文章来源: https://payatu.com/blog/android-lock-screen-bypass-through-google-gemini/
如有侵权请联系:admin#unsafe.sh