5060/tcp open on lo0 and ICMP Responses #769

Closed
securesearch opened this Issue Oct 14, 2017 · 2 comments

Comments

Projects
None yet
3 participants
@securesearch

Noticed that 5060/tcp is open on localhost to third party applications. No doubt this is linked to qualcomm processes and phone services. Tried to find out which process was listening on 5060 with netstat over adb but netstat simply listed the listening process as UNKNOWN. Unsure whether the listening process is exploitable, but seems unnecessary.

If this is something that you do look at, I would not suggest completely removing access to localhost for third party applications without a toggle, since quite a few applications rely on localhost to communicate with helper applications that communicate with custom USB peripherals, etc.

I also note that CopperheadOS devices respond to ICMP probes on wlan0. Of course, responding to these is only a minor issue, and can sometimes be a matter of personal preference, but maybe for privacy's sake disabling ICMP responses would be an idea.

@xbtc-im

This comment has been minimized.

Show comment Hide comment
@xbtc-im

xbtc-im Oct 14, 2017

netstat -utapn | grep 5060
tcp 0 0 0.0.0.0:5060 0.0.0.0:* UNKNOWN 582/netmgrd
tcp6 0 0 :::5060 :::* UNKNOWN 582/netmgrd
udp 0 0 0.0.0.0:5060 0.0.0.0:* UNKNOWN 582/netmgrd
udp6 0 0 :::5060 :::* UNKNOWN 582/netmgrd

it looks like it's open on 0.0.0.0 and netmgrd is vendor/proprietary ... I guess it can be firewalled anyway. I think this works as intended, it might have something to do with VoLTE stuff.

xbtc-im commented Oct 14, 2017

netstat -utapn | grep 5060
tcp 0 0 0.0.0.0:5060 0.0.0.0:* UNKNOWN 582/netmgrd
tcp6 0 0 :::5060 :::* UNKNOWN 582/netmgrd
udp 0 0 0.0.0.0:5060 0.0.0.0:* UNKNOWN 582/netmgrd
udp6 0 0 :::5060 :::* UNKNOWN 582/netmgrd

it looks like it's open on 0.0.0.0 and netmgrd is vendor/proprietary ... I guess it can be firewalled anyway. I think this works as intended, it might have something to do with VoLTE stuff.

@thestinger

This comment has been minimized.

Show comment Hide comment
@thestinger

thestinger Oct 14, 2017

Contributor

This is working as intended.

but maybe for privacy's sake disabling ICMP responses would be an idea.

How would it improve privacy? It just makes the device more easily identifiable as CopperheadOS. Either way, it's visible on networks when it's connected.

Contributor

thestinger commented Oct 14, 2017

This is working as intended.

but maybe for privacy's sake disabling ICMP responses would be an idea.

How would it improve privacy? It just makes the device more easily identifiable as CopperheadOS. Either way, it's visible on networks when it's connected.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment