Sony: The Console Prison With Old Doors


Sony is not stupid.

This is what makes the architecture interesting.

A stupid company builds a weak machine and loses. A clever company builds a strong machine, preserves old assumptions, adds compatibility, hides several computers inside one computer, and then loses in ways that require conference slides.

This is worse.

This is competent complexity.

The Supreme Leader has reviewed the PlayStation security lineage and found a recurring pattern:

Sony keeps building prisons. Then Sony keeps preserving old doors.

I. PS3: The Alien Artifact With Bad Crypto

In 2006, Sony shipped the PlayStation 3 and acted like it had built the final boss of console security.

The machine was strange on purpose.

The Cell Broadband Engine had one PowerPC-based PPE core and multiple Synergistic Processing Elements. Developers did not simply write games for it. They negotiated with it. The architecture had the feeling of a classified facility where the compiler was also suspicious of you.

PartPolitical meaning
Cell processorexotic computing shrine
Blu-ray drivestorage format and licensing altar
hypervisorSony’s first serious wall
OtherOStolerated until it became inconvenient
ECDSA signingcryptographic legitimacy

The PS3 wanted to be misunderstood.

Then fail0verflow arrived and showed that the magic castle had a crypto hole in the basement.

The famous PS3 failure was not that elliptic-curve cryptography was weak. It was that Sony’s implementation reused the ECDSA random value. In ECDSA, if the nonce is reused across signatures, private key recovery becomes possible.

This is not elite sorcery.

This is “do not roll your own crypto” written in flaming letters across a Blu-ray drive.

ECDSA rule:
  every signature needs a fresh secret nonce k

Sony PS3 failure:
  k was reused

Result:
  private signing key recovery becomes practical

Sony built a cathedral and left the sacristy unlocked with a math error.

II. PS4: The Adult Decision, Immediately Punished

For the PlayStation 4, Sony made the adult engineering decision.

No more Cell altar. No more exotic pilgrimage for ordinary developers.

The PS4 moved to:

  • AMD
  • x86-64
  • a semi-custom APU
  • an operating system called Orbis OS
  • a FreeBSD-derived base, widely reported as based on FreeBSD 9.0

On paper, this was sane.

A normal-ish CPU. A normal-ish kernel lineage. Better tools. Less developer suffering.

Studios could finally write games without needing a PhD in Sony archaeology.

But this is Sony, so sanity had to be punished.

Then the PS4 Pro arrived in 2016 and proved the deeper principle:

if the architecture is already carrying old assumptions, a mid-generation refresh does not absolve it. It merely gives the assumptions better clocks, more GPU, more memory bandwidth, and a nicer uniform.

The Pro was not a clean constitutional rewrite. It was a PS4 maxed out in the places marketing could explain: higher GPU budget, faster memory path, 4K ambition, and enough continuity that developers did not need to invade a second country.

Same state apparatus. Bigger portrait over the ministry entrance.

III. The PS4 Was Not “Just A PC”

The civilian says:

“The PS4 is basically a PC.”

The engineer opens the board and sees a custom PlayStation state.

Sony took a decent AMD machine and surrounded it with dedicated console infrastructure:

  • southbridge firmware
  • auxiliary processors
  • media paths
  • storage paths
  • Blu-ray logic
  • USB and standby behavior
  • USB recovery and update media
  • security processors and firmware islands

Names like Aeolia, Belize, and Baikal appear in public reverse-engineering notes and scene documentation. The exact boundaries vary by model and generation, but the lesson is stable:

the PS4 was “just a PC” in the same way a submarine is “just a metal tube.”

LayerWhat civilians imagineWhat the board suggests
CPUAMD x86-64semi-custom console APU
OSFreeBSD-like PC kernelOrbis with Sony policy grafts
southbridgeordinary chipsetcustom media, storage, standby, and security work
userlandgame launcherbrowser, media stack, system services, sandboxing
recovery mediaboring USB stickremovable disk invited near the crown jewels
firmwarebackground detailmany small authorities

The PS4 had a familiar kernel surface and unfamiliar platform organs.

That combination is dangerous.

It means attackers get enough normality to orient themselves and enough custom firmware to find new mistakes.

The USB part matters.

The PS4 was not a beige PC booting any random operating system from a thumb drive. The official path was narrower: Safe Mode and recovery flows could read a USB storage device containing Sony’s update or reinstall package, conventionally placed as:

PS4/UPDATE/PS4UPDATE.PUP

That still matters because it is a pre-OS maintenance ritual.

A removable disk is parsed. A filesystem is trusted enough to inspect. An update container is opened. Version logic runs. Signatures and policy checks decide whether the machine may rebuild itself.

This is not “USB equals instant jailbreak.” That would be peasant analysis.

The real lesson is sharper:

when recovery depends on removable media, removable media becomes part of the security architecture. The USB stick is not the king, but it is allowed into the palace with a clipboard.

The PS4 Pro inherited this whole ceremony. The slop did not vanish. It moved from PS4 to PS4 Pro with more bandwidth, more ambition, and a 4K badge.

IV. The Bugs Came With The Furniture

Sony tried to build a locked console.

It also shipped a browser.

This is how many console security stories begin.

The PS4 attack surface included:

  • WebKit for userland entry
  • a FreeBSD-derived kernel with familiar primitives
  • media and Blu-ray paths
  • custom auxiliary firmware
  • HDMI and CEC-style edges
  • PlayStation-specific services

The browser gave attackers a door. The BSD-derived kernel gave them familiar walls to tap. The custom processors gave them rooms Sony hoped no one would enter.

This is the problem with a console that wants to be:

  • entertainment appliance
  • web client
  • media box
  • Blu-ray player
  • game platform
  • secure execution environment
  • developer-friendly target

Every feature is a policy claim. Every parser is a border crossing.

V. PS5: Stronger Prison, Older Doorknobs

Then came the PlayStation 5.

Sony looked at PS4-era research and said:

“Fine. More locks.”

The PS5 security model added real friction:

  • hypervisor enforcement
  • stronger page protections
  • execute-only memory behavior
  • kernel write protection
  • nested paging
  • AMD PSP involvement
  • more isolation
  • more secure boot layers

This was not fake security theater.

Parts of the PS5 model were genuinely harder than PS4. Public PS5 developer documentation and research notes describe the hypervisor protecting control registers, write-protection behavior, and nested page table state that the guest kernel cannot simply rewrite.

PS4-era painPS5 response
kernel patching was too reachablehypervisor-backed enforcement
kernel text could be studied and patched more directlyexecute-only and stronger mappings
old exploit chains had known shapesmore isolation and boot-chain hardening
Sony firmware islands were exposed by researchmore compartmentalization
recovery/update paths touched removable mediastricter chain-of-trust and more guarded post-boot authority

The prison improved.

But the disease remained.

Compatibility.

VI. Compatibility: The Old Door Tax

Sony needed the PS5 to run PS4 games.

It needed developers to keep a familiar programming model. It needed WebKit. It needed Blu-ray Java. It needed BSD-derived behavior. It needed old assumptions to survive behind new walls. It still needed offline recovery, because a console that cannot reinstall itself after storage failure becomes expensive support theater.

This is the classic engineering compromise:

the lock is new, but the doorknob remembers 2013.

Compatibility is not free. It carries:

  • old APIs
  • old parser behavior
  • old kernel semantics
  • old userland expectations
  • old media stacks
  • old developer workflows

The Supreme Leader calls this the backward-compatibility hostage protocol.

The platform cannot leave the past. The attacker follows it there.

Sony did learn from the PS4 generation.

On PS5, USB recovery still exists, but the political meaning changed. The USB stick is still a courier for official update material, conventionally:

PS5/UPDATE/PS5UPDATE.PUP

But the console around it is more suspicious. Secure boot, package validation, stronger page protections, hypervisor enforcement, and tighter post-boot authority mean the USB path is less like a side entrance and more like a customs desk watched by three ministries.

The package may enter. The stick does not get a cabinet position.

VII. The Root Keys: Less Black Box, Not Instant Victory

In 2021, fail0verflow reported obtaining PS5 root keys. The important detail is not the headline version.

The keys discussed publicly were symmetric encryption keys used for firmware confidentiality and analysis, not the private asymmetric signing keys that would automatically let anyone sign arbitrary firmware as Sony.

That distinction matters.

Key typeWhat it gives
symmetric encryption/decryption keyfirmware can be decrypted and studied
private signing keycode could be made to appear authorized

The first is still important.

Once firmware can be studied properly, bugs stop being legends and become grep results.

The black box becomes gray.

VIII. The Exploit Chains

The PS5 did not fall through one magic bug.

It accumulated chains:

  • WebKit and userland entry routes
  • BD-J and Blu-ray Java paths
  • IPv6 kernel use-after-free work
  • UMTX-related chains
  • firmware-specific kernel read/write primitives
  • hypervisor limits that still constrained what could be patched

The public PS5 IPv6 kernel exploit line targeted firmware ranges around 3.00 through 4.51 and provided kernel read/write primitives. But on PS5, kernel read/write did not automatically mean the hypervisor surrendered.

This is the important difference.

On PS4, kernel control was often the throne. On PS5, kernel control could still be a provincial governorship under hypervisor occupation.

IX. The FreeBSD Ghost With A Crowbar

The funnier inheritance was UMTX.

FreeBSD published advisory material for a UMTX shared-memory issue, describing a kernel panic or further use-after-free attacks, potentially including code execution or Capsicum sandbox escape.

In PS5 research, UMTX-related work became relevant because Sony’s kernel lineage still carried BSD-derived shapes.

This is not “FreeBSD bad.”

This is the cost of forking a living operating system and carrying compatibility forward in a closed product. Upstream ghosts do not respect corporate fences.

They arrive later with commit history.

In upstream languageIn console language
kernel UAF class issueexploit chain material
Capsicum escape concernsandbox boundary concern
advisory and patchSony firmware archaeology
old semantic surfacenew research target

Congratulations, Sony:

you forked BSD, preserved behavior, and the ancestor returned holding the bug report.

X. Byepervisor: The Wall Starts Bleeding

Then researchers started cutting into the hypervisor itself.

The Byepervisor work documented PS5 hypervisor exploit paths on early firmware. The public project describes two independent chains:

  1. a jump-table path where hypervisor code jump tables were shared with the guest kernel
  2. a QA-flags path involving state shared across kernel and hypervisor, with sleep/resume behavior failing to reinitialize the situation cleanly

This is such a Sony bug that the Ministry of Console Affairs framed the slide.

Sony added a hypervisor to prevent the kernel from patching protected state.

Then enough shared state remained for the kernel to convince the hypervisor that it was debug Christmas.

Goal:
  hypervisor prevents guest kernel from rewriting protected mappings

Mistake class:
  shared state survives or crosses boundary incorrectly

Result:
  early firmware hypervisor assumptions become attack surface

The wall did not vanish. It started negotiating.

XI. The Generational Map

The full arc is simple:

ConsoleSony’s design moveWhat went wrong
PS3exotic Cell machine with strong signing modelECDSA nonce reuse exposed signing key material
PS4x86-64 AMD machine with FreeBSD-derived Orbis OSnormal surfaces, USB recovery rituals, and Sony custom firmware islands
PS4 Promaxed-out PS4: stronger GPU path, faster memory behavior, same familythe slop moved forward with more bandwidth and a 4K mustache
PS5hardened AMD platform with hypervisor and stronger page protectionscompatibility, inherited surfaces, WebKit, BD-J, UMTX, and hypervisor design bugs

Each generation improved.

Each generation also preserved enough old rope for attackers to climb the new wall.

XII. The Real Story (Suppressed)

Officially, Sony hardened each console generation after learning from the last.

Unofficially, the architecture committee followed a sacred doctrine:

  1. build a fortress
  2. add a web browser
  3. preserve old compatibility
  4. hide several smaller computers inside the larger computer
  5. act surprised when researchers bring flashlights

The PS3 was an alien artifact that lost because the crypto was wrong.

The PS4 was a PC that lost because Sony wrapped it in proprietary motherboard folklore.

The PS5 was a hardened PC that still bled because old assumptions were retained for compatibility, media support, developer continuity, and business necessity.

This is not bad engineering in the lazy sense.

It is worse.

It is good engineering trapped by old promises.

XIII. The Lesson

The PS5 is not poorly engineered.

That would be too easy.

The PS5 is well engineered by people forced to preserve old assumptions.

And old assumptions are where exploits go to retire, start a family, and come back ten years later with a CVE.

— Kim Jong Rails, Supreme Leader of the Republic of Derails