Tech

A vulnerability in MediaTek processors exposes the audios of thousands of Android users

While MediaTek was managing to be the focus of the news for its increasingly strong competition against Qualcomm, this time its popularity has become a double-edged sword. And it is that according to the latest reports, it seems that some of the latest models of the Taiwanese manufacturer would have a major security flaw that would have exposed the audio of thousands of devices Android.

This has been shared by the company specialized in cybersecurity Check Point, who would have discovered this vulnerability through an investigation using methods such as reverse engineering on the software of a Redmi Note 9 5G, locating two affected parts in its processors: the processing unit of Artificial Intelligence (APU) and a digital audio signal processor (DSP).

A vulnerability that could have been exploited to gain access to the device’s audio at any time, eavesdropping on the conversations of its users.

On the other hand, according to AndroidPolice, at the moment there is no list with the possible devices or chips of the company that could have been affected by this vulnerability, which at the moment targets all MediaTek Dimensity processors with 5G connectivity, as well as any other processor of the brand that you use the APU platform called Tensilica.

A name that would affect not only the Dimensity processors, but could also be extended to part of the MediaTek Helio family, something still to be confirmed.

However, if you own a phone with one of these processors, you should no longer have anything to fear, as the latest security updates received last October would have fixed and these vulnerabilities. So if you haven’t done it yet, we urge you not to postpone it.

However, what remains to be assessed now are the possible violations that occurred up to this date and its possible scope, although apparently no exploitation has been detected.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *