processor face a major security worry as over 400 code vulnerabilities have been discovered by security researchers at
. The researchers claimed that these “vulnerable pieces of code” were found within the
Digital Signal Processor unit (DSP) chips.
Check Point in an official blog post claimed that using these vulnerabilities an attacker can turn the phone into a perfect spying tool, without any user interaction required.
“The information that can be exfiltrated from the phone include photos, videos, call-recording, real-time microphone data, GPS and location data, etc,” it said.
The researchers also warned that an attacker can even make a Qualcomm Snapdragon chipset-powered Android phone unresponsive and useless. “Attackers may be able to render the mobile phone constantly unresponsive – Making all the information stored on this phone permanently unavailable – including photos, videos, contact details, etc – in other words, a targeted
,” added Check Point.
What’s more alarming is that malware can also hide inside phones, track activities and even become unremovable.
“We disclosed these findings with Qualcomm, who acknowledged them, notified the relevant device vendors,” said Check Point.
DSP is an important chipset that has hardware and software designed to enable each component on a
. It can enable quick charging capabilities, control video, HD Capture, AR features along with audio features too. “Simply put, a DSP is a complete computer on a single chip...may include features to enable daily mobile usage such as image processing, computer vision, neural network-related calculations, camera streaming, audio and voice data,” it explained.
These vulnerabilities are not yet known and there is very little end users can do apart from waiting for a software patch from their mobile brand.