Gaps we may not be able to stand up to, especially those that reach very safe areas
Hundreds of millions of smartphones, especially those running Android devices that use Qualcomm processors, are exposed to a range of potential security vulnerabilities. According to a new report published by security specialist CheckPoint, these defects allow attackers to steal sensitive data stored in a secure area that is supposed to be the most protected part of the phone. Gaps are concentrated in Qualcomm's secure implementation environment (QSEE), an application for trusted implementation environments based on ARM TrustZone technology, known as Qualcomm's Secure World, a secure area designed to protect sensitive information and provide a separate secure environment. REE to implement trusted applications.
QSEE, along with important personal information, contains special encryption keys, passwords, and user credentials. Because of the encryption algorithms used, Normal World system modules such as drivers and applications can access protected areas only if necessary, even when you have permission to access the root of the phone. In safe areas for attackers to implement trusted applications such as Android operating system or other trusted applications.
In short, a vulnerability in the TEE component makes devices vulnerable to a wide range of security threats including leakage of protected data and access to the root of the phone. Vulnerabilities also affect a wide range of smartphones and IoT devices that use the QSEE component to secure sensitive information for users. Many companies like LG and Samsung update to fix that problem and started sending it to users.
Comments
Post a Comment