The audio decoders in Qualcomm and MediaTek chips have been reported to contain three security vulnerabilities.
Leaving unpatched three of these security holes could provide the threat actors with remote access to the media and audio conversations from affected mobile devices if they aren’t patched.
The security analysts at Check Point asserted that by sending a specially crafted audio file, an attacker could gain remote code execution (RCE) access.
In this case, the vulnerability was discovered in ALAC (Apple Lossless Audio Codec), a lossless audio format introduced by Apple in 2004.
It has been more than a decade since ALAC has been used in many devices and programs other than those from Apple. Nowadays ALAC is used in several devices like:-
MediaTek and Qualcomm both got their ALAC flaws fixed in December 2021, and are now listed and tracked as:-
Whenever an attack is carried out remotely, there are severe consequences that result:-
Through the vulnerabilities found in ALAC, the cybersecurity analysts believe an attacker could use a specially crafted malicious audio file to attempt a remote code execution attack (RCE) on a mobile device.
An RCE attack allows an attacker to remotely execute malicious code on a computer by conducting a remote code execution attack at this stage.
In a turn-key scenario, the data could be disclosed and access to privileges could be elevated for a time period without a human interaction being required.
The cybersecurity experts at CheckPoint security firm have recommended some mitigations and here they are:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…
The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…
Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…
Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…
The watering hole attack leverages a compromised website to deliver malware. When a user visits…
The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and…