Security News > 2021 > May > Qualcomm Chip Bug Opens Android Fans to Eavesdropping

Qualcomm Chip Bug Opens Android Fans to Eavesdropping
2021-05-06 19:55

A vulnerability in a 5G modem data service could allow mobile hackers to remotely target Android users by injecting malicious code into a phone's modem - gaining the ability to execute code, access mobile users' call histories and text messages, and eavesdrop on phone calls.

That's according to Check Point Research, which said that the bug exists in the Qualcomm Mobile Station Modem Interface, which is known as QMI for short.

The impact of the bug could be far-reaching: MSMs have been used since the pre-mobile internet 2G era of mobile devices, and QMI is used in roughly 30 percent of the globe's handsets, according to Check Point, including Google Pixels, LG models, OnePlus devices, Samsung's flagship Galaxy line and Xiaomi phones.

As for attack vector, essentially, attackers can exploit the bug to attack a mobile device remotely, via a malicious or trojanized Android application, a Check Point spokesperson told Threatpost.

"Assuming a malicious application is running on the phone, it can use this vulnerability to 'hide' itself within the modem chip, making it invisible in terms of all security measures on phones today."

Qualcomm chips have had flaws before; for instance, six serious bugs in Qualcomm's Snapdragon mobile chipset were revealed by Check Point at last year's DEF CON. They impacted up to 40 percent of Android phones in use, and opened up handsets to denial-of-service and privilege-escalation attacks.


News URL

https://threatpost.com/qualcomm-chip-bug-android-eavesdropping/165934/

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Qualcomm 2173 99 463 864 439 1865
Android 4 0 17 2 0 19