Android Phone

Four vulnerabilities in Qualcomm and Mali GPUs are being actively exploited in the wild

Why it matters: A set of vulnerabilities Impacting kernel drivers for Qualcomm and Mali GPUs in countless Android mobiles was exploited in the wild. Google Pixel apparatus are the only ones repaired so much, but the continuing problem of delayed upgrades for additional Android apparatus stays.

Before this month, users were informed of a Critical security flaw within Qualcomm chips powering countless millions of Android apparatus, as detected by security company Check Point. This week, Google upgraded the Android Security Bulletin for May to signify the reality that four of these vulnerabilities revealed on May 1 have been exploited in the wild.

The first report recorded no less than 42 Vulnerabilities which were patched at the May 2021 security upgrade, but in the time the firm had no understanding that any was being actively exploited. New data suggested that the four of them might be under”restricted, targeted manipulation,” that initially seemed somewhat obscure.

Google Project Zero researcher Maddie Stone Sought to describe these are really 0-day flaws from an increasing list that has been detected since the start of this season.

Two of the flaws influence Qualcomm GPUs in Countless chipsets, such as the hottest 5G-enabled ones such as the Snapdragon 768G and Snapdragon 888.

The other two vulnerabilities affect the kernel Catalyst for Arm Mali GPUs (used in countless Android apparatus ) and its significance cannot be understated, since they enable an attacker to take full control over your cell phone.

Asaf Peleg, vice president of security company Zimperium, told Ars Technica that”from philosophical rights beyond what’s offered by default to implementing code out the current procedure’s present sandbox, the apparatus would be completely compromised, and no information will be secure.”

Leave a Comment