Date:04/03/20
The elevation-of-privilege flaw, tracked as CVE-2020-0069, is disclosed in Google's March 2020 Android bulletin and affects the MediaTek Command Queue driver.
The dangerous part about this bug is that an exploit has been floating around for almost a year called 'MediaTek-su', which enables temporary root access on a large number of MediaTek chips.
A developer who goes by the name 'diplomatic' used XDA-Developers' forums to share a script that users can run to gain superuser (su) access.
While it was originally intended for rooting Amazon Fire devices to modify them, any app can incorporate MediaTek-su and execute it to gain root access in shell, according to XDA-Developers. However, a malicious app's root access won't survive a device reboot.
TrendMicro reported in January that several malicious apps available on Google Play were using MediaTek-su to gain root access on Android devices.
The apps were using the exploit to collect infected devices' location, battery status, files, a list of installed apps, screenshots and data from WeChat, Outlook, Twitter, Facebook, Gmail and Chrome. Google removed the offending apps at the time.
According to XDA-Developers, MediaTek says the vulnerability affects MediaTek devices with Linux Kernel versions 3.18, 4.4, 4.9, or 4.14 running Android versions 7 Nougat, 8 Oreo, or 9 Pie.
MediaTek devices running Android 10 are not vulnerable since "the access permission of CMDQ device nodes is also enforced by SELinux", the company said.
MediaTek actually had patches available for the flaw in May 2019, which were rolled out by Amazon for its Fire OS devices. However, many OEMs using affected MediaTek chips hadn't applied the fix and so the company reportedly sought Google's help.
Now that Google has released a fix in its Android update, users with a MediaTek device should install them from their OEM.
Android security: Google patches a dangerous flaw in these phones
Google has disclosed a severe vulnerability affecting dozens of models of mid-range Android devices running on chips from MediaTek. Malicious Android apps have been exploiting the flaw since at least January 2020.The elevation-of-privilege flaw, tracked as CVE-2020-0069, is disclosed in Google's March 2020 Android bulletin and affects the MediaTek Command Queue driver.
The dangerous part about this bug is that an exploit has been floating around for almost a year called 'MediaTek-su', which enables temporary root access on a large number of MediaTek chips.
A developer who goes by the name 'diplomatic' used XDA-Developers' forums to share a script that users can run to gain superuser (su) access.
While it was originally intended for rooting Amazon Fire devices to modify them, any app can incorporate MediaTek-su and execute it to gain root access in shell, according to XDA-Developers. However, a malicious app's root access won't survive a device reboot.
TrendMicro reported in January that several malicious apps available on Google Play were using MediaTek-su to gain root access on Android devices.
The apps were using the exploit to collect infected devices' location, battery status, files, a list of installed apps, screenshots and data from WeChat, Outlook, Twitter, Facebook, Gmail and Chrome. Google removed the offending apps at the time.
According to XDA-Developers, MediaTek says the vulnerability affects MediaTek devices with Linux Kernel versions 3.18, 4.4, 4.9, or 4.14 running Android versions 7 Nougat, 8 Oreo, or 9 Pie.
MediaTek devices running Android 10 are not vulnerable since "the access permission of CMDQ device nodes is also enforced by SELinux", the company said.
MediaTek actually had patches available for the flaw in May 2019, which were rolled out by Amazon for its Fire OS devices. However, many OEMs using affected MediaTek chips hadn't applied the fix and so the company reportedly sought Google's help.
Now that Google has released a fix in its Android update, users with a MediaTek device should install them from their OEM.
Views: 333
©ictnews.az. All rights reserved.Similar news
- Azerbaijani project to monitor disease via mobile phones
- Innovative educational system to be improved under presidential decree
- NTRC prolongs license of two TV and radio organizations for 6 years
- Azerbaijan establishes e-registry for medicines
- Azerbaijani museum introduces e-guide
- Nar Mobile opens “Nar Dunyasi” sales and service center in Siyazan city
- International conference on custom electronic services held in Baku
- OIC secretary general to attend COMSTECH meeting in Baku
- Azerbaijan develops earthquake warning system
- New law to regulate transition to digital broadcasting in Azerbaijan
- Azerbaijani State Social Protection Fund introduces electronic digital signature
- Intellectual traffic management system in Baku to be commissioned in December
- Tax Ministry of Azerbaijan started receiving video-addresses
- World Bank recommends Azerbaijan to speed up e-service introduction in real estate
- Azerbaijan to shift to electronic registration of real estate