Several Android smartphones and tablets powered by MediaTek chipsets are vulnerable to security attacks due to a software bug.
The flaw, if exploited, allows an attacker to glean private data including photos, contacts, and even remotely monitor all traffic. The chipmaker confirmed the existence of the vulnerability, and added that its security team is currently working on the issue.
Justin Case, a security researcher reported about the vulnerability on Twitter earlier this month. Explaining the vulnerability, Case told that MediaTek software has a "backdoor" that allows a user - or a malicious app - to enable root access. The problem, as Case explained, is a user or a malicious app can change the usually restricted and read only properties on the device, which "can trivially lead to privilege escalation to the root user." "Root user could do many things, such as access data normally protected from the user/ other apps, or brick the phone, or spy on the user, monitor communications etc," Case told over email.
Taiwan-based MediaTek, whose chips power several popular Android phones, told us that the vulnerability exists on devices running Android 4.4 KitKat. Explaining how the vulnerability got there in the first place, MediaTek said that a debug feature was created for telecommunication inter-operability testing mainly in China. The smartphone manufacturers, however, didn't disable the debug feature before shipping the smartphones, the company added. MediaTek didn't disclose the names of the manufacturers.
"We are aware of this issue and it has been reviewed by MediaTek's security team. It was mainly found in devices running Android 4.4 KitKat, due to a de-bug feature created for telecommunication inter-operability testing in China," a MediaTek spokesperson told in an emailed statement. "After testing, phone manufacturers should disable the de-bug feature before shipping smartphones. However, after investigation, we found that a few phone manufacturers didn't disable the feature, resulting in this potential security issue."
Case noted that read-only properties - ro.properties - should not change after booting the device, however, MediaTek has "'nerved' the property space, they made it so these properties can be changed, and changed by anyone/app. A malicious app could set the 'ro.secure' property to 0, ro.debuggable one to 1, ro.adb.secure prop to 0 (this would mean ADB didn't need authentication) and then enable the ADB over Wi-Fi property, and get a local root shell."
MediaTek declined to specify the smartphone models and the number of handsets that are impacted. The company insists that the issue only affects certain manufacturers and it has begun to alert them. "While this issue affected certain manufacturers, it also only affected a portion of devices for those manufacturers. We have taken steps to alert all manufacturers and remind them of this important feature."
110 Reykjavik, Iceland