Google closes a serious vulnerability in the Android system that struck devices running your media chipset
XDA Developers has revealed that Google is closing a dangerous Android system rampage
that has infected millions of devices running your media chipset.
The loophole is the deposit of a rootkit “tools and malware control software” into the core CPU software
- It allows any simple text command with “script” languages
- to control the Android system on any of the devices running
- the 64-bit MediaTek chips
- This means that the vulnerability was present on hundreds of categories
- and models of phones, tablets
- and computers operating on one of your mentioned MediaTek chips.
The report indicated that the first official indication
from Google of the vulnerability was via the March 2020 Android Security Update Bulletin (CVE-2020-0069);
This, in turn
- brought the closure of the vulnerability that lasted for months online,
- The penetration problem is still present in a wide range
- of media models of 64-bit MediaTek chips
It is still widely used by pirates, according to the report.
It was also mentioned that many Android devices
will not get the new security update to fill the vulnerability.
The risk lies in this type of security vulnerabilities
that hackers can use in various ways, the first of which is the possibility of installing any application on the device
And then obtain access permissions that allow them
to penetrate the device and acquire the files in it and activate malware ransomware
and swap with the owner for money or anything else.
Google has patched a critical security flaw that affects millions of Android devices with chipsets from MediaTek
XDA Developers revealed today. The vulnerability is a rootkit lodged in the CPU’s firmware
Although It allows a simple script to root Android devices that use nearly any of MediaTek’s 64-bit chips
so it has compromised hundreds of budget and mid-range smartphone,
tablet and set-top box models, XDA says.
Google noted the patch (CVE-2020-0069)
in its March Android security bulletin
in conclusion While this is the first public disclosure
- details about the exploit have been online for months.
- The vulnerability is still exploitable on dozens of device models, and hackers are actively using it.
- Worse, in all likelihood, many devices will never get the patch at all.