TechnoclinicTechnoclinic
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Software Bug Leaves Several MediaTek-Powered Android Devices Vulnerable to Attack
Share
Sign In
Aa
TechnoclinicTechnoclinic
Aa
Search
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Technoclinic > PHONES > Software Bug Leaves Several MediaTek-Powered Android Devices Vulnerable to Attack
PHONES

Software Bug Leaves Several MediaTek-Powered Android Devices Vulnerable to Attack

srijita
Last updated: 2016/01/29 at 4:31 AM
srijita
Share
SHARE
Software Bug Leaves Several MediaTek-Powered Android Devices Vulnerable to Attack

Several Android smartphones and tablets powered by MediaTek chipsets are vulnerable to security attacks due to a software bug. The flaw, if exploited, allows an attacker to glean private data including photos, contacts, and even remotely monitor all traffic. The chipmaker confirmed the existence of the vulnerability to Gadgets360, and added that its security team is currently working on the issue.

Justin Case, a security researcher reported about the vulnerability on Twitter earlier this month. Explaining the vulnerability, Case told Gadgets360 that MediaTek software has a “backdoor” that allows a user – or a malicious app – to enable root access. The problem, as Case explained, is a user or a malicious app can change the usually restricted and read only properties on the device, which “can trivially lead to privilege escalation to the root user.”

“Root user could do many things, such as access data normally protected from the user/ other apps, or brick the phone, or spy on the user, monitor communications etc,” Case told Gadgets 360 over email.

Taiwan-based MediaTek, whose chips power several popular Android phones, told us that the vulnerability exists on devices running Android 4.4 KitKat. Explaining how the vulnerability got there in the first place, MediaTek said that a debug feature was created for telecommunication inter-operability testing mainly in China. The smartphone manufacturers, however, didn’t disable the debug feature before shipping the smartphones, the company added. MediaTek didn’t disclose the names of the manufacturers.

“We are aware of this issue and it has been reviewed by MediaTek’s security team. It was mainly found in devices running Android 4.4 KitKat, due to a de-bug feature created for telecommunication inter-operability testing in China,” a MediaTek spokesperson told Gadgets 360 in an emailed statement. “After testing, phone manufacturers should disable the de-bug feature before shipping smartphones. However, after investigation, we found that a few phone manufacturers didn’t disable the feature, resulting in this potential security issue.”

Case noted that read-only properties – ro.properties – should not change after booting the device, however, MediaTek has “‘nerved’ the property space, they made it so these properties can be changed, and changed by anyone/app. A malicious app could set the ‘ro.secure’ property to 0, ro.debuggable one to 1, ro.adb.secure prop to 0 (this would mean ADB didn’t need authentication) and then enable the ADB over Wi-Fi property, and get a local root shell.”

MediaTek declined to specify the smartphone models and the number of handsets that are impacted. The company insists that the issue only affects certain manufacturers and it has begun to alert them. “While this issue affected certain manufacturers, it also only affected a portion of devices for those manufacturers. We have taken steps to alert all manufacturers and remind them of this important feature.”

[“source-gadgets.ndtv”]

TAGGED: Several MediaTek-Powered Android Devices, Software Bug Leaves, Vulnerable to Attack

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
srijita January 29, 2016
Share this Article
Facebook Twitter Copy Link Print
Share
Previous Article Apple Recalls AC Power Adapters Sold Outside the US
Next Article Moto X Force ‘Shatterproof’ Phone Listed on Amazon India Ahead of Launch

Latest News

Is Your C3PAO Really Familiar With Updated CMMC Level 2 Requirements?
NEWS
The best tablets for business in 2025
TABLETS
HDTV Buying Guide: Top Flat-Screen HDTVs
HDTV
How to Prepare for the Mandatory Windows 11 Upgrade
LAPTOPS
How to Clean Your Flat-Screen TV The Right Way
HDTV
AI and Content Management: How Organizations Can Prepare for the Future
SOFTWARE

Most Viewed Posts

  • Bengaluru Lady Turns Blinkit Conveyance Specialist For A Day And Her Choice Prompted Significant Changes In Application (1,337)
  • Choosing the Right Tablet for Blogging and Writing On the Go (1,274)
  • How to Start a Product Review Blog (Templates & Examples) (1,221)
  • How To Start A Review Blog and Get Free Review Products (1,202)
  • What You Need to Know About Smartphones vs. Tablet use of the Mobile Internet (1,169)

© 2023 TechnoClinic Network. TechnoClinic Company. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?