Qualcomm chipsets find vulnerabilities affecting 30% of smartphones



Qualcomm's mobile phone chipset 'Mobile Station Modem (MSM)' that provides functions such as voice and SMS for smartphones is vulnerable to malicious code being embedded and access to call history from the outside ( A survey by

cybersecurity company Check Point Software (CPR) has revealed that it is vulnerable.

Security probe of Qualcomm MSM data services --Check Point Research
https://research.checkpoint.com/2021/security-probe-of-qualcomm-msm/



Android users' privacy at risk as Check Point Research identifies vulnerability on Qualcomm's mobile station modems --Check Point Software

https://blog.checkpoint.com/2021/05/06/android-users-privacy-at-risk-as-check-point-research-identifies-vulnerability-on-qualcomms-mobile-station-modems/

Developed by Qualcomm, MSM is designed for high-end models of Android OS and supports advanced features such as 4G LTE and high resolution recording. Android devices also have their own protocol that allows communication between MSM software components and subsystems on devices such as cameras and fingerprint scanners via the Qualcomm MSM interface (QMI), through this QMI. , CPR states that a vulnerability has been found that could allow a malicious person to exploit MSM.

If the vulnerability discovered this time is exploited, an attacker will be able to use the Android OS itself as an entry point to insert malicious code and access the user's call history, SMS, etc.



MSM is mainly used for 5G compatible smartphones of Google, Samsung, LG, Xiaomi and OnePlus, and it is said that about 30% of smartphones in the world are affected.

In August 2020, Qualcomm found more than 400 vulnerabilities in the SoC 'Snapdragon' for mobile terminals, and CPR said that an attacker could gain unauthorized access to location information and media inside the terminal. It is known by investigation.

More than 400 vulnerabilities in Qualcomm's Snapdragon chip in more than 1 billion smartphones-GIGAZINE



in Mobile,   Hardware,   Security, Posted by log1p_kr