PS5: “Byepervisor” exploit files and presentation slides released

olo · October 26, 2024

Screenshot by @Andrew2007__

Following his presentation of an exploit for the PS5 Hypervisor at the Hardwear.io infosec conference yesterday (or, specifically, 2 exploits), PlayStation hacker SpecterDev has now published the files for the hypervisor exploit, as well as the slides for the presentation.

For all compatible firmwares (2.xx/1.xx), the exploit  includes Kernel dumping code and code to decrypt SELF (Encrypted ELF) files. Furthermore, those of you lucky enough to be on Firmware 2.50 exactly, should be able to enjoy the included HEN (Homebrew Enabler).

What is Byepervisor

The PS5 Hypervisor is a piece of middleware designed to protect the console’s Firmware, notably its kernel, from malicious attacks. The Hypervisor in particular enforces eXecute Only Memory (XOM) rules on the kernel, to avoid attackers from reading/writing critical parts of the system. It is a key component of the PS5’s security, and bypassing or hacking it has forever been considered an essential part of getting full control over the PS5 system.

Byepervisor is such an exploit for earlier versions of the PS5 Hypervisor, which works on Firmwares 2.xx and 1.xx. This is an exploit by SpecterDev, which the PlayStation hacker disclosed in October 2024.

From the readme:

PS5 hypervisor exploit for <= 2.xx firmware. Two vulnerabilities and exploit chains are contained in the repo, they are independent of each other and either can be used. One exploit is provided mainly just for preservation (/_old_jump_table_exploit), only the primary exploit chain needs to be used (QA flags exploit).

Download and use Byepervisor

You can download the Byepervisor exploit source code at https://github.com/PS5Dev/Byepervisor

You should really build it yourself from the sources (if you can’t/won’t do that, I’ll be bold and say that this kind of tool, in its current state, is probably not for you), but Zecoxao has provided a compiled version here: https://qiwi.gg/file/5j5w6925-byepervisornologger (source)

The slides for SpecterDev’s presentation can also be found at https://github.com/PS5Dev/Byepervisor/blob/main/Byepervisor_%20Breaking%20PS5%20Hypervisor%20Security.pdf

Important notes (from the readme)

  • Currently only 2.50 FW is supported for Homebrew Enabler (HEN), support for other firmware versions will be added at a later time.
  • The exploit payload (byepervisor.elf) will need to be sent twice, once before suspending the system and again after resuming.
  • You will have to put the system into rest mode manually yourself
  • Kernel dump from QA flags exploit will not contain hypervisor’s .data region at the moment, if this is important for you, dump using the jump table exploit after porting or disable nested paging first (this is a TODO)

How to use (From the readme)

  1. Run the UMTX exploit chain in webkit or BD-J and run an ELF loader
  2. Send byepervisor.elf
  3. Put the system into rest mode
  4. Power system back on
  5. Send byepervisor.elf again (if you use John Tornblom’s ELF loader, the ELF loader should continue to accept payloads after resume, if not the UMTX exploit will need to be run again)

PS5 Byepervisor exploit – What’s next?

Although only 2.50 is supported right now for HEN, it is very likely that all firmwares 2.xx/1.xx will get HEN support in the days or weeks to come (work is already ongoing for that). That is obviously still a minority of users even for those among us interested in PS5 hacking, but there’s also hope that this will help discover more vulnerabilities down the line, including on higher Firmwares. Because Kernel dump/decryption is now relatively easy on those firmwares, PS5 Firmware decompilation will be happening more broadly, and this should lead to interesting discoveries for the scene.

Source: SpecterDev

Leave a Comment

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

0
    0
    Chọn game
    Giỏ game trốngTrở lại trang
    Scroll to Top