Google finally patches MediaTek chip flaw that affected millions of Android devices

The latest March 2020 Android security update has fixed a critical security vulnerability that impacted millions of MediaTek devices. 

According to Google’s recent Android Security Bulletin, the flaw, know as CVE-2020-0069, affected the Command Queue driver.

This would allow users to gain SuperUser or Root access on various Android devices, giving them the ability to delete pre-installed apps, unlock the bootloader, tweak system parameters and sideload applications from the Google Play Store, opening up possible multiple security threats.

According to reports online, this rootkit has been available online since April 2019. Although MediaTek released a patch to attempt to fix this vulnerability last year, it was still being exploited by hackers, who could install a malicious app, access user files, use the device to snoop on to the users, or even render it useless by bricking it.

The exploit, reportedly works on almost all devices powered by MediaTek’s 64-bit chipsets, a list which includes devices from popular manufacturers like Alcatel, Amazon, ASUS, Blackview, Huawei, LG, Meizu, Nokia, Motorola, OPPO, Sony, Realme, Xiaomi, and ZTE many more. 

Taiwanese chipmaker MediaTek powers hundreds of Android devices, not just smartphones, but also set-top boxes, tablets and other devices. Since most of these are entry lever or mid-budget devices, they hardly receive software updates from their manufacturers. 

Now that Google’s March 2020 security patch has been released, most devices would ideally be able to update it until and unless the manufacturer release it further.

 Via: XDA-Developers 


Source

The latest March 2020 Android security update has fixed a critical security vulnerability that impacted millions of MediaTek devices.  According to Google’s recent Android Security Bulletin, the flaw, know as CVE-2020-0069, affected the Command Queue driver. This would allow users to gain SuperUser or Root access on various Android devices,…

Leave a Reply

Your email address will not be published. Required fields are marked *