Critical Android Bug Let Attackers to Access Users’ Media and Audio Conversations

The audio decoders in Qualcomm and MediaTek chips have been reported to contain three security vulnerabilities. 

Leaving unpatched three of these security holes could provide the threat actors with remote access to the media and audio conversations from affected mobile devices if they aren’t patched.

The security analysts at Check Point asserted that by sending a specially crafted audio file, an attacker could gain remote code execution (RCE) access.

In this case, the vulnerability was discovered in ALAC (Apple Lossless Audio Codec), a lossless audio format introduced by Apple in 2004.

It has been more than a decade since ALAC has been used in many devices and programs other than those from Apple. Nowadays ALAC is used in several devices like:-

  • Android-based smartphones
  • Linux media players and converters
  • Windows media players and converters

Flaws Detected

MediaTek and Qualcomm both got their ALAC flaws fixed in December 2021, and are now listed and tracked as:-

  • CVE ID: CVE-2021-0674
  • Summary: A case of improper input validation in ALAC decoder leading to information disclosure without any user interaction.
  • Severity: Medium
  • CVSS Score: 5.5 score
  • CVE ID: CVE-2021-0675
  • Summary: A local privilege escalation flaw in ALAC decoder stemming from out-of-bounds write.
  • Severity: High
  • CVSS Score: 7.8 score
  • CVE ID: CVE-2021-30351
  • Summary: An out-of-bounds memory access due to improper validation of a number of frames being passed during music playback.
  • Severity: Critical
  • CVSS Score: 9.8 score

Whenever an attack is carried out remotely, there are severe consequences that result:-

  • Data breach
  • Deploying malware
  • Executing malware
  • Modifying device settings
  • Accessing microphone
  • Accessing camera
  • Take over account

Potential Threat

Through the vulnerabilities found in ALAC, the cybersecurity analysts believe an attacker could use a specially crafted malicious audio file to attempt a remote code execution attack (RCE) on a mobile device.

An RCE attack allows an attacker to remotely execute malicious code on a computer by conducting a remote code execution attack at this stage. 

In a turn-key scenario, the data could be disclosed and access to privileges could be elevated for a time period without a human interaction being required.

Recommendation

The cybersecurity experts at CheckPoint security firm have recommended some mitigations and here they are:-

  • Ensure that your device is up to date.
  • Always use a robust security solution or AV app.
  • Always use complex passwords.
  • Make sure to enable multi-factor authentication.
  • Do not use any used or dumped passwords.
  • Installing a third-party Android distribution, if your device doesn’t receive security updates.
  • Do not open any audio files from unknown or suspicious sources/users.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

CISA Warns of Palo Alto Networks PAN-OS Vulnerability Exploited in Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…

23 hours ago

US Treasury Department Breach, Hackers Accessed Workstations

The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…

1 day ago

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…

1 day ago

New Botnet Exploiting D-Link Routers To Gain Control Remotely

Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…

2 days ago

Hackers Weaponize Websites With LNK File To Deliver Weaponized LZH File

The watering hole attack leverages a compromised website to deliver malware. When a user visits…

2 days ago

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and…

2 days ago