Image utilized for representative function only.
Just after releasing a superior-severity warning for end users of Google Chrome operating technique and Mozilla products, the Indian Laptop or computer Crisis Reaction Workforce (CERT-In) below the Ministry of Electronics and Information Know-how has issued a new advisory for Android smartphone end users. The warning from the government’s cybersecurity workforce is for the folks who use UNISOC chipset based Android smartphones.
As for every CERT-In, a vulnerability has been documented in Android smartphones powered by UNISOC chipset. The vulnerability can be exploited by a distant attacker to execute arbitrary code and execute denial of company on the specific product.
What CERT-In has to say about the vulnerability
In accordance to CERT-In, the vulnerability exists in UNISOC smartphones chipset thanks to buffer overflow in the element that handles Non-Entry Stratum (NAS) messages in the present day firmware. An attacker can deliver a malformed packet that would reset the modem, depriving the user of the risk of interaction.
The company has specifically talked about that vulnerability is in the modem firmware and not in the Android working technique. Exploitation of the bug can let a cybercriminal to conduct denial of assistance (DoS) on the targeted product.
What is a DoS assault and how it is dangerous
In very simple terms, a DoS attack is a cybersecurity menace that takes place when a malicious code tries to make a system or network resource impossible to obtain. This means that you will not be ready to use your smartphone if it is under a DoS attack. It is well worth noting that in most scenarios, the DoS assault does not final result in theft or loss of individual details that is stored on your smartphone.
CERT-In implies that users of Android smartphones with UNISOC chipsets really should promptly suitable updates described by the seller.