Multiple security weaknesses have been disclosed in MediaTek system-on-chips (SoCs) that could have enabled a threat actor to elevate privileges and execute arbitrary code in the firmware of the audio processor, effectively allowing the attackers to carry out a ”massive eavesdrop campaign” without the users’ knowledge.

The discovery of the flaws is the result of reverse-engineering the Taiwanese company’s audio digital signal processor (DSP) unit by Israeli cybersecurity firm Check Point Research, ultimately finding that by stringing them together with other flaws present in a smartphone manufacturer’s libraries, the issues uncovered in the chip could lead to local privilege escalation from an Android application.

The Hacker News

0 0 röster
Article Rating
DanishEnglishFinnishFrenchGermanLatinNorwegianSpanishSwedish
0
Vi vill mycket gärna höra vad du tycker - kommentera mera!x
()
x