TechnoclinicTechnoclinic
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Search
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Reading: Software Bug Leaves Several MediaTek-Powered Android Devices Vulnerable to Attack
Share
Sign In
Aa
TechnoclinicTechnoclinic
Aa
Search
  • Home
  • APPS
  • CAMERAS
    • PRINTERS
  • GAMING
    • LAPTOPS
  • HDTV
  • NEWS
  • PHONES
    • TABLETS
  • REVIEWS
  • SOFTWARE
  • Contact Us!
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Technoclinic > PHONES > Software Bug Leaves Several MediaTek-Powered Android Devices Vulnerable to Attack
PHONES

Software Bug Leaves Several MediaTek-Powered Android Devices Vulnerable to Attack

srijita
Last updated: 2016/01/29 at 4:31 AM
srijita
Share
SHARE
Software Bug Leaves Several MediaTek-Powered Android Devices Vulnerable to Attack

Several Android smartphones and tablets powered by MediaTek chipsets are vulnerable to security attacks due to a software bug. The flaw, if exploited, allows an attacker to glean private data including photos, contacts, and even remotely monitor all traffic. The chipmaker confirmed the existence of the vulnerability to Gadgets360, and added that its security team is currently working on the issue.

Justin Case, a security researcher reported about the vulnerability on Twitter earlier this month. Explaining the vulnerability, Case told Gadgets360 that MediaTek software has a “backdoor” that allows a user – or a malicious app – to enable root access. The problem, as Case explained, is a user or a malicious app can change the usually restricted and read only properties on the device, which “can trivially lead to privilege escalation to the root user.”

“Root user could do many things, such as access data normally protected from the user/ other apps, or brick the phone, or spy on the user, monitor communications etc,” Case told Gadgets 360 over email.

Taiwan-based MediaTek, whose chips power several popular Android phones, told us that the vulnerability exists on devices running Android 4.4 KitKat. Explaining how the vulnerability got there in the first place, MediaTek said that a debug feature was created for telecommunication inter-operability testing mainly in China. The smartphone manufacturers, however, didn’t disable the debug feature before shipping the smartphones, the company added. MediaTek didn’t disclose the names of the manufacturers.

“We are aware of this issue and it has been reviewed by MediaTek’s security team. It was mainly found in devices running Android 4.4 KitKat, due to a de-bug feature created for telecommunication inter-operability testing in China,” a MediaTek spokesperson told Gadgets 360 in an emailed statement. “After testing, phone manufacturers should disable the de-bug feature before shipping smartphones. However, after investigation, we found that a few phone manufacturers didn’t disable the feature, resulting in this potential security issue.”

Case noted that read-only properties – ro.properties – should not change after booting the device, however, MediaTek has “‘nerved’ the property space, they made it so these properties can be changed, and changed by anyone/app. A malicious app could set the ‘ro.secure’ property to 0, ro.debuggable one to 1, ro.adb.secure prop to 0 (this would mean ADB didn’t need authentication) and then enable the ADB over Wi-Fi property, and get a local root shell.”

MediaTek declined to specify the smartphone models and the number of handsets that are impacted. The company insists that the issue only affects certain manufacturers and it has begun to alert them. “While this issue affected certain manufacturers, it also only affected a portion of devices for those manufacturers. We have taken steps to alert all manufacturers and remind them of this important feature.”

[“source-gadgets.ndtv”]

TAGGED: Several MediaTek-Powered Android Devices, Software Bug Leaves, Vulnerable to Attack

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
srijita January 29, 2016
Share this Article
Facebook Twitter Copy Link Print
Share
Previous Article Apple Recalls AC Power Adapters Sold Outside the US
Next Article Moto X Force ‘Shatterproof’ Phone Listed on Amazon India Ahead of Launch

Latest News

Case Study: Nissan and Teads’ Immersive Concept Car Campaign Transformed Scrolls into Stories
NEWS
Review of Hootsuite: Advantages, Drawbacks, Features, and Other Options
REVIEWS
From Idea to Launch: The Software Development Journey
SOFTWARE
How schools can save money and work more efficiently with managed print services
PRINTERS
How to Write Powerful Blog Posts, Comparisons, and Reviews
REVIEWS
How to Defrost Your Lens with Condensation
CAMERAS

Most Viewed Posts

  • Choosing the Right Tablet for Blogging and Writing On the Go (1,043)
  • What You Need to Know About Smartphones vs. Tablet use of the Mobile Internet (993)
  • How to Start a Product Review Blog (Templates & Examples) (989)
  • How To Start A Review Blog and Get Free Review Products (986)
  • App Annie now tracks 5,000 Android apps in China: Report (981)

© 2023 TechnoClinic Network. TechnoClinic Company. All Rights Reserved.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?