News by Xiaomi Miui Hellas
Home » All the news » News » Press release » MediaTek SoC security gap allows conversations to be intercepted on Android Smartphones
Press release

MediaTek SoC security gap allows conversations to be intercepted on Android Smartphones

check-point-research-logo

Η Check Point Research (CPR), its research team Check Point Software, points out security holes in its chip MediaTek processor found in 37% of smartphones worldwide.


ΑIf these vulnerabilities were not fixed, a hacker could exploit the vulnerabilities to eavesdrop on Android users, but also to hide malicious code on their devices.

Η Check Point Research (CPR) identified security holes in the Taiwanese company chip smartphone chip, MediaTek. Her chip MediaTek it is at 37% of smartphones worldwide and serves as the main processor for almost every notable Android device, including Xiaomi, Oppo, Realme, Vivo and others. Security vulnerabilities have been identified in the chip's audio processor, and if left unchecked, vulnerabilities could allow a hacker to eavesdrop on an Android user and / or hide malicious code.


the history

Her chips MediaTek contain a special processing unit AI (APU) and a digital audio signal processor (DSP) to improve multimedia performance and reduce CPU usage. Both APU as much as DSP audio have custom microprocessor architectures, making it MediaTek DSP a unique and difficult goal for security research. THE CPR began to be concerned about the extent to which the MediaTek DSP could be used as an attack vehicle for the perpetrators. For the first time, the CPR managed to do reverse engineering of its audio processor MediaTek, revealing several security vulnerabilities.

The Methodology of the attack

To exploit vulnerabilities, the sequence of actions of a threatening agent, in theory, would be as follows:

  1. A user installs a malicious application from the Play Store and launches it
  2. The application uses the MediaTek API to attack a library that has access to the audio driver
  3. The permissions application sends edited messages to the audio driver to execute code in the audio processor firmware
  4. The application steals the audio stream

Responsible Disclosure

CPR officially disclosed its findings to MediaTek, creating the following: CVE-2021-0661, CVE-2021-0662, CVE-2021-0663. These three vulnerabilities were subsequently corrected and published in MediaTek Security Bulletin in October 2021. The security problem in MediaTek audio HAL (CVE-2021-0673) was corrected in October and will be published in its Security Bulletin MediaTek the December of 2021.

CPR also informed Xiaomi of its findings.

Comment by Slava Makkaveev, Security Researcher at Check Point Software:

MediaTek is known to have the most popular chip for mobile devices. Given its ubiquitous presence in the world, we began to suspect that it could be used as a carrier by potential hackers. We started research on technology, which led to the discovery of a chain of vulnerabilities that could potentially be used to reach and attack the chip audio processor from an Android application. If left unchecked, a hacker could potentially exploit vulnerabilities to listen in on Android users' conversations. In addition, security vulnerabilities could have been exploited by device manufacturers themselves to create a massive eavesdropping campaign.

Although we do not see any concrete evidence of such abuse, we moved quickly to communicate our findings to the MediaTek and Xiaomi. In short, we have proven a completely new attack vector that could have abused the Android API. Our message to the Android community is to update their devices to the latest security update to keep them protected. THE MediaTek worked diligently with us to ensure that these security issues were rectified in a timely manner and we are grateful for their cooperation and spirit for a safer world.

Comment by Tiger Hsu, Product Security Officer at MediaTek:

Device security is a critical element and priority of all its platforms MediaTek. As for his vulnerability Audio DSP revealed by Check Point, we worked diligently to verify the issue and make appropriate remedies available to all OEM manufacturers. We have no evidence that there was an exploitation incident.

We encourage users to update their devices when fixes are available and to install apps only from trusted sites, such as the Google Play Store. We value collaboration with the Check Point research team to make the MediaTek product ecosystem more secure.

For more information, see: MediaTek Product Security.

Press Release


Mi TeamDo not forget to follow it Xiaomi-miui.gr on Google News to be informed immediately about all our new articles! You can also if you use RSS reader, add our page to your list by simply following this link >> https://news.xiaomi-miui.gr/feed/gn

 

Follow us on Telegram so that you are the first to learn our every news!

 

Read also

Leave a comment

* By using this form you agree to the storage and distribution of your messages on our page.

This site uses Akismet to reduce spam comments. Find out how your feedback data is processed.

Leave a Review

Xiaomi Miui Hellas
The official community of Xiaomi and MIUI in Greece.
Read also
Netflix launched Netflix Games earlier this month, and…