Checkpoint research researchers have identified a weakness in some Motorola smartphones, including Unisoc SoCs.
With Chipset crisis The geography of leading semiconductor companies, which has entered the mobile industry over the past two years (and beyond), has seen some companies increasingly focus on growing in popularity. References just don’t go away MediaTek – for which there is a substantial increase in the quality and quantity of offers – but lesser known brands such as UNICEFChip manufacturer of Chinese descent.
The last few hours have seen an increase in popularity due to the presence of the company Weakness Three inserted into a chipset Smartphone Motorola. As reported by the American editorial team Android PoliceThe research firm has discovered a weakness in the Checkpoint Research chip UNESCO Tiger T700 Installed Motorola Moto G20, Moto E30 and Moto E40Available in all Europe.
This problem manifests itself as the modem tries to connect to one LTE network And will pose a risk of attack Refuse to serve. Checkpoint researchers immediately notified UNESCO of the issue and the company, which assessed vulnerabilities in the question as it critically affects user safety. Score 9.4 out of 10 Unisoc itself ran for cover by correcting distortions).
Weaknesses of Motorola smartphones: Unisoc is already running for cover
The ball is now a pass GoogleWhich may extend the fix to users Motorola With the latest June Android Security PatchIt is understood that the Lenovo subsidiary will be responsible for extending the promotion of the update to the devices affected by this vulnerability.
This is not the first chipset UNICEF Come forward for security reasons. The Last March, Checkpoint research company Unisk has discovered a serious flaw related to the SC9863A (28NM) chipset that has been found in a number of budget Android smartphones. If exploited, this vulnerability would allow attackers to access a variety Sensitive information User, such as data stored on the device, i Text message Interacting with other users, losing your contact list and call logs, system logs, and even your smartphone.