Major Vulnerability Found in MediaTek Chipsets Could Affect Smartphones

Major Vulnerability Found in MediaTek Chipsets Could Affect Smartphones



MediaTek chipsets are reportedly carrying a vital vulnerability which could make it straightforward for hackers to take advantage of distant code execution (RCE) assaults. Based on a cybersecurity agency, among the chips have this vulnerability which majorly impacts units similar to routers and smartphones. Notably, the vulnerability was reported in March, nevertheless, a proof-of-concept was revealed just lately on GitHub highlighting that exploiting this was potential. The agency has rated it a vital zero-click vulnerability with a CVSS 3.0 rating of 9.8.

In a blog post, the menace analysis group of SonicWall Seize Labs has detailed the brand new vulnerability. The flaw has been designated CVE-2024-20017 and is described as a vital zero-click vulnerability. Put merely, such a safety flaw permits attackers to take advantage of a system remotely, with none motion or interplay required from the sufferer. This implies the person doesn’t have to observe any templates utilized in a conventional phishing assault.

The researchers gave the vulnerability a rating of 9.8, highlighting its vital nature. The difficulty was noticed significantly in two MediaTek Wi-Fi chipsets, MT7622 and MT7915, in addition to the RTxxxx sequence SoftAP driver bundles. These chipsets are sometimes utilized by producers similar to Xiaomi, Ubiquiti, and Netgear for smartphones and routers. As per the cybersecurity agency, the vulnerability impacts MediaTek SDK variations 7.4.0.1 and earlier and OpenWrt variations 19.07 and 21.02.

Coming to the exploitation, this vulnerability opens the chance for a distant code execution. As per the researchers, attackers can use a “desk overwrite approach by way of a return-oriented programming (ROP) chain” to assemble delicate info from the gadget with out the necessity for the person to do something.

One motive why the vulnerability is being highlighted now as an alternative of March when it was first found, is as a result of a GitHub submit has showcased a proof-of-concept of the vulnerability, explaining that finishing up an assault utilizing CVE-2024-20017 is feasible.

Notably, the researchers reached out to MediaTek and the chip maker has launched patches to repair the safety flaw. Customers have additionally been requested to replace the firmware as quickly as potential.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *