MediaTek Chip Flaw Could Have Let Attackers Spy on Android Phones - Hexafusion Blog | Hexafusion

Hexafusion Blog

MediaTek Chip Flaw Could Have Let Attackers Spy on Android Phones

Newly discovered vulnerabilities in MediaTek chips, embedded in 37% of smartphones and Internet of things (IoT) devices around the world, could have enabled attackers to eavesdrop on Android users from an unprivileged application.

The vulnerabilities specifically exist in a part of the MediaTek system-on-chip that handles audio signals, Check Point Research explained in a blog post. Modern MediaTek chips, which are built into high-end phones from Xiaomi, Oppo, Realme, and Vivo, have an artificial intelligence (AI) processing unit (APU) and audio digital signal processor (DSP) to boost media performance and reduce CPU usage.

Researchers say the goal of their analysis was to find a way to attack the audio DSP from an Android phone. The team reverse-engineered the MediaTek audio DSP firmware to find several flaws that are accessible from the Android user space, they report.

They found that an unprivileged Android application could abuse the AudioManager API by setting a crafted parameter value to attack a vulnerability in the Android Aurisys hardware abstraction layer (HAL) (CVE-2021-0673). By chaining this bug with flaws in the OEM partner's libraries, the MediaTek security flaw Check Point found could lead to local privilege escalation from an Android app. With this, an Android app may be able to send messages to the audio DSP firmware.

Three other vulnerabilities in the audio DSP itself (CVE-2021-0661, CVE-2021-0662, CVE-2021-0663) may allow an attacker to perform additional malicious actions, such as to hide and execute code within the audio DSP chip.

The flaws discovered in the DSP firmware have been patched and published in the October 2021 MediaTek Security Bulletin, Check Point reports. CVE-2021-0673 was fixed in October and will appear in the December 2021 MediaTek Security Bulletin.

Read Check Point Research's blog post and technical write-up for more information.

Original author: Dark Reading Staff, Dark Reading
Cloud Governance Solution Provider CoreStack Raise...
OpenText Acquires Bricata


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 24 January 2022

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Customer Login

News & Updates

Contact us

Learn more about what Hexafusion can do for your business.

250 - 997 Seymour Street
Vancouver, British Columbia V6B 3M1