Home » today » Technology » Metro Jaya law enforcement warning about Chinese HP Mediatek processors

Metro Jaya law enforcement warning about Chinese HP Mediatek processors

Jakarta, CNBC Indonesia – The Cyber ​​Division of Polda Metro Jaya asked the public to be cautious of cell (HP) phones from China with Mediatek chips, as they ended up vulnerable to counterfeit payments.

“Warning! Chinese phones with Mediatek chips are susceptible to counterfeit payments!” write the Cyber ​​Division account of the Polda Metro Jaya on the Instagram account @siberpoldametrojaya, quoted on Thursday (9/1/2022).

Police claimed the revealed vulnerabilities could be exploited to disable cellular payment mechanisms and even for faux transactions by means of Android mounted on the gadget.

ANNOUNCEMENT

Scroll to resume articles


Nonetheless, the police did not point out the manufacturer of the mobile mobile phone in dilemma. It is only composed that the HP model in problem has the code N9T and N11.

The expanding vulnerability in Chinese telephones with MediaTek chips is mentioned to manifest because of to the deficiency of command over the earlier variations, so that these weaknesses show up and can be exploited by hackers to carry out their actions.

Check out Issue Investigation Report

The vulnerability was found just after analysis done by Examine Level Study (CPR), a investigate firm dependent in the United States (United states).

CPR claimed that the manufacturer in dilemma was Xiaomi. The place is a selection of vulnerabilities in Xiaomi applications liable for running the stability of equipment and cell payments, which are utilized by thousands and thousands of customers all around the earth.

“In this report, CPR (Cell) researchers evaluate the payment procedure set up on Xiaomi smartphones driven by MediaTek chips, which are incredibly popular in China,” mentioned the CPR analysis, cited by its formal site.

For the duration of this assessment, CPR learned vulnerabilities that permit payment fraud or disable payment devices straight from unprivileged Android apps.

“In our analysis, we focused on the responsible apps of the units supported by MediaTek. The check machine utilized was Xiaomi Redmi Take note 9T 5G with MIUI World-wide OS 12.5.6..” they explained.

As a result, unprivileged Android apps can exploit the CVE-2020-14125 vulnerability to run code in trustworthy WeChat applications and pretend payment designs.

Right after disclosure by CPR, this vulnerability was corrected by Xiaomi in June 2022.

On top of that, CPR reveals how a downgrade vulnerability in Xiaomi’s dependable execution natural environment (TEE) can make it possible for older variations of the wechat application to steal non-public keys. This examining vulnerability was also corrected and solved by Xiaomi following the disclosure of the study by the CPR to the enterprise.

Future article

The Covid blockade in China slows down Xiaomi’s revenue




(Roy / Roy)


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.