Google and other Android manufacturers try to keep as much hardware and software as possible at varying severity. But the vulnerability in the widely used Qualcomm SoC revealed today by Check Point Research is particularly shocking. It could theoretically allow malicious apps to modify software for Qualcomm̵

7;s MSM modem chips, allowing access to call and text history, or even the ability to record conversations.

Breaking down the Check Point problem is extremely technical. But, to mention, laypeople would find a connection vulnerability between the Qualcomm Modem Interface (QMI) software layer of the modem and the debugger service, enabling dynamic software fixes and bypassing the usual security mechanisms. Standard third-party apps do not have security rights to access QMI, but if they are compromised, a critical portion of Android can use this attack.

With the vulnerabilities they discovered, the researchers identified the malicious app could listen and record active calls, receive calls and record SMS, or even unlock the SIM card.Check Point assessed the QMI software it discovered to have. The vulnerability is present in about 40% of smartphones from vendors such as Samsung, Google, LG, OnePlus, Xiaomi, etc.

While the method for this attack has been broadly described, the specific required information is withheld from the report to prevent anyone from easily replicating the process.As of now, there is no indication. Point out that this method of attack was being used “in the wild”.

Qualcomm has been aware of the issue since CPR disclosed in October last year and confirmed it was a highly rated vulnerability, forwarding to Android manufacturers using modems at the time of writing. modify But it is expected that both Qualcomm and Google are working to integrate the solution with future security patches.

Qualcomm commands

After we posted this story, a Qualcomm representative has contacted us with an official comment from the company:

Providing technology that supports strong security and privacy is essential to Qualcomm. We commend security researchers from Check Point for implementing industry-standard harmonized disclosure practices. OEM is available in December 2020 and we encourage end users to update their devices when patches are available.

The representative went on to state that a “large number of” Android OEMs have released relevant security updates to end users and that there is no specific evidence that a vulnerability discovered by Check Point was exploited. On a public Android bulletin in June