Multiple Bugs Enable Eavesdropping on 37% of Android Phones
Security researchers have revealed new vulnerabilities in a popular Android chip which could have allowed threat actors to snoop on the audio of nearly two-fifths (37%) of the world’s smartphones.
CVE-2021-0661, CVE-2021-0662 and CVE-2021-0663 were fixed by Taiwanese microchip company MediaTek in its October bulletin after responsible disclosure by Check Point Research. A fourth issue, CVE-2021-0673, was fixed in October and will be published in the December bulletin.
The Check Point team said it reverse engineered one of the key components on the chip, the audio digital signal processor (DSP), which is deployed to reduce CPU usage and improve media performance.
The bugs in question could be exploited if the user downloads a malicious app.
That app would theoretically then leverage the MediaTek API to attack a library with permissions to talk to the audio driver. As the app has system privileges it would then be able to send crafted messages to the driver to execute code into the firmware of the audio DSP, said Check Point.
This would enable remote attackers to eavesdrop on audio conversations.
MediaTek’s chip is the main processor for “nearly every notable Android device,” including several