If you use a MediaTek-powered device, you should update your security level ASAP

The last time we talked about the security firm Check Point Research, it was about how cryptocurrency scammers were using Google Ads to target their victims. This time, Check Point are back with more worrying findings, but regarding vulnerabilities in MediaTek’s mobile system-on-chips.

You can check out their full post on the specifics of how they did it, but in short most new MediaTek processors have a special AI processing unit (APU) and an audio digital signal processor (DSP) that use a custom Tensilica Xtensa microprocessor architecture. The folks over at Check Point Research though used a rooted Redmi Note 9 with a MediaTek Dimensity 800U in it and found that it was possible to bypass the security features in place. By carrying out what’s known as a local privilege escalation attack via an app, Check Point Research managed to access the data that went through the APU and DSP. In short, this meant that you could eavesdrop on the device owner.

The good news though is that the hack was never spotted in the wild. Instead, Check Point Research had to reverse engineer the Android API responsible for communication with the audio processor and the firmware on the DSP before being able to take advantage of the vulnerabilities in MediaTek’s code. Once their app got through, it was able to get system-level permissions it would even be able to hide malicious code into the DSP chip itself. It’s likely that all of MediaTek’s chips with the Tensilica APU platform were affected, though neither Check Point nor MediaTek gave a list of affected processors. Curiously, some of Huawei’s Kirin processors also have Tensilica code in it, but there’s also no word if those could be affected.

The even better news though is that the researchers at Check Point claim MediaTek is aware of the vulnerabilities, and have since patched them out too in their October security level patch. This means that if you’re currently using a smartphone with a MediaTek processor in it, you should check for updates and download the latest available Android security patch level. If you see that it’s one from October or later, then it should be safe.

With MediaTek processors now in over 40% of smartphones across the world, it’s perhaps good to know that the Taiwanese company took Check Point Research’s findings seriously and patched out the potential loopholes in their chips before any serious issues cropped up.

[ SOURCE ]

Recent Posts

Toyota bZ4X launched in Malaysia: 227hp, 525km WLTP range, 150kW DC charging, priced at RM220,000

After being teased and showcased in Malaysia for over three years, the Toyota bZ4X has…

19 minutes ago

Maybank MAE users: Update your app by 11 April or risk losing access

Maybank has issued a notice informing all MAE online banking app users to update their…

2 hours ago

JomCharge offers 50% off EV Charging and Free Coffee at Bangsar this weekend

JomCharge is running a promo this weekend at several JomChargeDiKL street-level EV Chargers in Bangsar,…

13 hours ago

Nothing Phone (4a) & (4a) Pro now official in Malaysia: Glyph Matrix, 50MP cameras, Snapdragon 7s Gen 4, priced from RM1,999

Nothing has launched its latest mid-range smartphones, the Nothing Phone (4a) and (4a) Pro, here…

16 hours ago

Tesla Supercharger at The Mall, Mid Valley Southkey is now open. Free charging until 5th April

Tesla Malaysia has turned on yet another Supercharger in Johor Bahru. Shortly after opening its…

20 hours ago

Toyota Hilux BEV launched in Malaysia: Dual-motor AWD, 750kg payload and less than 300km WLTP-rated range

Toyota has officially launched the Hilux BEV in Malaysia as part of the brand’s introduction…

2 days ago

This website uses cookies.