Η checkpoint research (CPR) κατέγραψε μια κρίσιμη ευπάθεια ασφαλείας στο smartphone τσιπ της UNISOC, το οποίο είναι υπεύθυνο για την επικοινωνία μέσω κινητoύ στο 11% των smartphones παγκοσμίως.

If not repaired, an attacker could exploit it to neutralize or block communication. The CPR investigation marks the first time a UNISOC smart chip has been built backwards to test for security flaws.
UNISOC identified the vulnerability and rated it 9,4 / 10 (critical).
The vulnerability is in the firmware of the modem, not the modem itself operating system Android, and affects UNISOC's 4G and 5G chipsets.
Η google ενημερώνει ότι η ευπάθεια θα δημοσιευτεί στο επερχόμενο δελτίο ασφαλείας του Android.
Research for the first time
The CPR investigation marks the first time the UNISOC modem has been reverse-engineered and probed for vulnerabilities. CPR scanned the NAS message handlers within a short period of time and found a vulnerability, which can be used to disrupt its radio communication deviceς μέσω ενός κακοσχηματισμένου πακέτου.
A hacker or military unit can exploit such a vulnerability to thwart communications at a particular location.
Responsible disclosure
CPR responsibly disclosed these findings to UNISOC in May 2022, which acknowledged the vulnerability, giving it a score of 9,4 (critical). UNISOC has since issued the repair CVE-2022-20210. Google said the fix will be published in the upcoming Android security bulletin.
Η Check Point προτρέπει τους users κινητών τηλεφώνων να ενημερώνουν πάντα το λειτουργικό σύστημα του κινητού τους τηλεφώνου στο τελευταίο διαθέσιμο λογισμικό.
Statement by Slava Makkaveev, of the department Reverse Engineering & Security Research νομικών συμβούλων της Check Point Software:
“We are the first to reverse engineer and probe the UNISOC modem for vulnerabilities. We found a vulnerability in the UNISOC modem built into 11% of smartphones. An attacker could use a radio station to send a malformed packet that will reset the modem, denying the user the ability to communicate. If not patched, mobile communication can be blocked by an attacker. The vulnerability is in the modem firmware, not Android itself. Android users can't do anything right now, although we strongly recommend that they apply the patch that Google will release in the upcoming Android Security Bulletin".
