MediaTek chipset vulnerability found, promptly mounted

Check Point Investigation has posted a white paper detailing a vulnerability that was set by MediaTek in Oct. The vulnerability allowed the so-known as privilege escalation attack.

The challenge by itself is related to artificial intelligence and audio processing, and applications with the proper code may have experienced obtain to technique-huge audio information and facts that apps normally do not have. Even additional subtle apps could have launched an interception assault.

Look at Level Exploration points out that the vulnerability is rather intricate and the investigation group had to crack the approach. In small, an application could have passed instructions to the audio interface and extract information and facts only if the attackers experienced regarded about the collection of exploits in MediaTek’s firmware.

There is no details that this kind of assaults took area and present-day homeowners of MediaTek-dependent products should not worry as the enterprise has already mounted the vulnerability with an Oct update.

Neither the researchers nor MediaTek have shared a checklist of afflicted gadgets or chips, but the whitepaper cites SoCs primarily based on the so-called Tensilica APU system. Curiously, there are some Huawei HiSilicon Kirin chips managing on the exact system but there is no information and facts as to whether or not they are or have been susceptible to this kind of assaults.

by way of

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.