New vulnerability on MediaTek chip makes 30% of Android smartphones can be eavesdropped
MediaTek is one of the largest semiconductor companies in the world. As of the second quarter of 2021, MediaTek chips appear in 43% of all smartphones globally.
The vulnerabilities discovered by Check Point and three of them, CVE-2021-0661, CVE-2021-0662 and CVE-2021-0663 have been patched right in the October 2021 update MediaTek Security Bulletin. The fourth vulnerability, CVE-2021-0673, will be patched next month.
If you don't regularly install the latest security updates, newly discovered vulnerabilities on MediaTek chips will make Android smartphones vulnerable to eavesdropping attacks, malware infections or privilege escalation attacks.
Older smartphone models that no longer support security updates run the risk of not receiving MediaTek's patch.
Details of the vulnerability on the MediaTek chip
The new chipsets from MediaTek use a dedicated audio processor called Digital Signal Processor (DSP) to reduce CPU load and improve audio quality and performance.
The DSP receives audio processing requests from Android applications through the driver and the IPC system. Theoretically, an unprivileged application could exploit vulnerabilities to manipulate request processing and run code on the DSP.
The audio driver does not communicate directly with the DPS, but with IPI messages that are passed to the System Control Processor (SCP).
By reversing the Android API code responsible for audio communication, Check Point discovered the following vulnerabilities:
- CVE-2021-0661, CVE-2021-0662, and CVE-2021-0663: Incorrect bounds checks lead to out-of-bounds writes and local privilege escalation.
- CVE-2021-0673: Details will be revealed next month.
By combining these vulnerabilities, hackers can perform local privilege escalation attacks, send messages to the DSP firmware, and hide or run code on the DSP chip itself.
"Since the DSP firmware has access to the audio data stream, a malformed IPI message can be exploited by a hacker to escalate privileges and theoretically could eavesdrop on smartphone users," Check Point said. To share.
Because there is no patch for the CVE-2021-0673 vulnerability, MediaTek has removed the ability to use the parameter string command through AudioManager to reduce the possibility of exploitation.
If you are using an Android smartphone equipped with a MediaTek chip, you should consider updating its software as soon as possible.
You should read it
- Google warns of a vulnerability that allows Android smartphones to be attacked with just a phone number
- AMD CPUs also have security vulnerabilities that have existed for many years now!
- Detected a serious BIOS vulnerability, affecting many Intel processors
- What to do to protect the device from ZombieLoad attack?
- What is VENOM Vulnerability? How can you protect yourself?
- Google will cooperate with MediaTek in Android One project
- New privilege escalation vulnerability called 'Dirty Pipe' is threatening all Linux distros
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worse
- Critical Vulnerability Discovered in 3 WordPress Plugins, Affects 84,000 Websites
- Microsoft urgently patched zero-day vulnerability after 2 years of refusing to acknowledge it
- Sony will use MediaTek processor for high-end smartphones
- Google discovered a dangerous zero day vulnerability on many Samsung Galaxy, Huawei, Xiaomi and even Pixel phones
Maybe you are interested
MediaTek is about to release the 'blockbuster' Dimensity 9400
NVIDIA and MediaTek cooperate to develop AI chips, competing with Intel, AMD and Qualcomm
Samsung considers choosing to add a MediaTek chip version to the Galaxy S25 line
All you need to know about the Dimensity 8250, MediaTek's latest mid-range chipset
MediaTek Dimensity 9300, shows impressive performance results in Geekbench 6, but still cannot beat Apple A17 Pro
Leaked specifications of MediaTek Dimensity 9300: Highest clock speed of 3.25GHz with 12-core GPU