Critical Android Bug Let Attackers to Access Users’ Media and Audio Conversations

The audio decoders in Qualcomm and MediaTek chips have been reported to contain three security vulnerabilities. 

Leaving unpatched three of these security holes could provide the threat actors with remote access to the media and audio conversations from affected mobile devices if they aren’t patched.

The security analysts at Check Point asserted that by sending a specially crafted audio file, an attacker could gain remote code execution (RCE) access.

In this case, the vulnerability was discovered in ALAC (Apple Lossless Audio Codec), a lossless audio format introduced by Apple in 2004.

It has been more than a decade since ALAC has been used in many devices and programs other than those from Apple. Nowadays ALAC is used in several devices like:-

  • Android-based smartphones
  • Linux media players and converters
  • Windows media players and converters

Flaws Detected

MediaTek and Qualcomm both got their ALAC flaws fixed in December 2021, and are now listed and tracked as:-

  • CVE ID: CVE-2021-0674
  • Summary: A case of improper input validation in ALAC decoder leading to information disclosure without any user interaction.
  • Severity: Medium
  • CVSS Score: 5.5 score
  • CVE ID: CVE-2021-0675
  • Summary: A local privilege escalation flaw in ALAC decoder stemming from out-of-bounds write.
  • Severity: High
  • CVSS Score: 7.8 score
  • CVE ID: CVE-2021-30351
  • Summary: An out-of-bounds memory access due to improper validation of a number of frames being passed during music playback.
  • Severity: Critical
  • CVSS Score: 9.8 score

Whenever an attack is carried out remotely, there are severe consequences that result:-

  • Data breach
  • Deploying malware
  • Executing malware
  • Modifying device settings
  • Accessing microphone
  • Accessing camera
  • Take over account

Potential Threat

Through the vulnerabilities found in ALAC, the cybersecurity analysts believe an attacker could use a specially crafted malicious audio file to attempt a remote code execution attack (RCE) on a mobile device.

An RCE attack allows an attacker to remotely execute malicious code on a computer by conducting a remote code execution attack at this stage. 

In a turn-key scenario, the data could be disclosed and access to privileges could be elevated for a time period without a human interaction being required.

Recommendation

The cybersecurity experts at CheckPoint security firm have recommended some mitigations and here they are:-

  • Ensure that your device is up to date.
  • Always use a robust security solution or AV app.
  • Always use complex passwords.
  • Make sure to enable multi-factor authentication.
  • Do not use any used or dumped passwords.
  • Installing a third-party Android distribution, if your device doesn’t receive security updates.
  • Do not open any audio files from unknown or suspicious sources/users.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Google’s SafetyCore App Secretly Scans All Photos on Android Devices

Recent revelations about Google’s SafetyCore app have ignited a firestorm of privacy debates, echoing Apple’s…

2 hours ago

New “nRootTag” Attack Turns 1.5 Billion iPhones into Free Tracking Tools

Security researchers have uncovered a novel Bluetooth tracking vulnerability in Apple’s Find My network –…

3 hours ago

Authorities Arrested Hacker Behind 90 Major Data Breaches Worldwide

Cybersecurity firm Group-IB, alongside the Royal Thai Police and Singapore Police Force, announced the arrest…

4 hours ago

Cisco Nexus Vulnerability Allows Attackers to Inject Malicious Commands

Cisco Systems has issued a critical security advisory for a newly disclosed command injection vulnerability…

7 hours ago

New Wi-Fi Jamming Attack Can Disable Specific Devices

A newly discovered Wi-Fi jamming technique enables attackers to selectively disconnect individual devices from networks…

7 hours ago

GitLab Vulnerabilities Allow Attackers to Bypass Security and Run Arbitrary Scripts

GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…

9 hours ago