CVE-2020-0069 (GCVE-0-2020-0069)
Vulnerability from cvelistv5 – Published: 2020-03-10 19:56 – Updated: 2025-10-21 23:35
VLAI?
CISA KEV
Summary
In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
Severity ?
7.8 (High)
CWE
- Elevation of privilege
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
KEV entry ID: b717c8a3-4f58-4264-bcfd-958d36da342f
Exploited: Yes
Timestamps
First Seen: 2021-11-03
Asserted: 2021-11-03
Scope
Notes: KEV entry: Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability | Affected: MediaTek / Multiple Chipsets | Description: Multiple MediaTek chipsets contain an insufficient input validation vulnerability and have missing SELinux restrictions in the Command Queue drivers ioctl handlers. This causes an out-of-bounds write leading to privilege escalation. This vulnerability was observed chained with CVE-2019-2215 and CVE-2020-0041 under exploit chain "AbstractEmu." | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-0069
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-787 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Multiple Chipsets |
| Due Date | 2022-05-03 |
| Date Added | 2021-11-03 |
| Vendorproject | MediaTek |
| Vulnerabilityname | Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
Created: 2026-02-02 13:26 UTC
| Updated: 2026-02-06 07:53 UTC
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T05:47:40.759Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://source.android.com/security/bulletin/2020-03-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2020-0069",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-07T13:03:30.656110Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2021-11-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-0069"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:35:49.217Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-0069"
}
],
"timeline": [
{
"lang": "en",
"time": "2021-11-03T00:00:00.000Z",
"value": "CVE-2020-0069 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Android",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Android kernel"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Elevation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-05-27T11:06:04.000Z",
"orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
"shortName": "google_android"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://source.android.com/security/bulletin/2020-03-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@android.com",
"ID": "CVE-2020-0069",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_value": "Android kernel"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://source.android.com/security/bulletin/2020-03-01",
"refsource": "MISC",
"url": "https://source.android.com/security/bulletin/2020-03-01"
},
{
"name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en",
"refsource": "CONFIRM",
"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
"assignerShortName": "google_android",
"cveId": "CVE-2020-0069",
"datePublished": "2020-03-10T19:56:37.000Z",
"dateReserved": "2019-10-17T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:35:49.217Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2020-0069",
"cwes": "[\"CWE-787\"]",
"dateAdded": "2021-11-03",
"dueDate": "2022-05-03",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2020-0069",
"product": "Multiple Chipsets",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Multiple MediaTek chipsets contain an insufficient input validation vulnerability and have missing SELinux restrictions in the Command Queue drivers ioctl handlers. This causes an out-of-bounds write leading to privilege escalation. This vulnerability was observed chained with CVE-2019-2215 and CVE-2020-0041 under exploit chain \"AbstractEmu.\"",
"vendorProject": "MediaTek",
"vulnerabilityName": "Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-0069\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2020-03-10T20:15:21.947\",\"lastModified\":\"2025-10-23T14:52:54.557\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754\"},{\"lang\":\"es\",\"value\":\"En los manejadores de ioctl del controlador Mediatek de Command Queue, hay una posible escritura fuera de l\u00edmites debido a un saneamiento de entrada insuficiente y a una falta de restricciones de SELinux. Esto podr\u00eda conllevar a una escalada de privilegios local sin ser necesarios privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. Producto: Android, Versiones: kernel de Android, ID de Android: A-147882143, Referencias: M-ALPS04356754\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2021-11-03\",\"cisaActionDue\":\"2022-05-03\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Mediatek Multiple Chipsets Insufficient Input Validation Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.177\\\\(c10e3r1p4\\\\)\",\"matchCriteriaId\":\"BCEFDA14-C332-4604-85E5-332231B8853B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB51593F-70AE-47F6-AFE5-02693181E599\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.178\\\\(c00e178r1p4\\\\)\",\"matchCriteriaId\":\"046C3C00-63A5-4CA9-9BFA-DEDF7D3A1D90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F63CA2F-45B8-4DD3-81AE-8359929AE50B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.177\\\\(c10e4r1p4\\\\)\",\"matchCriteriaId\":\"3135BBC7-2A18-47E9-9041-16077B1102A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07042814-6B3A-4D7C-A776-02DA9AC9B8DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:columbia-tl00b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.178\\\\(c01e178r1p4\\\\)\",\"matchCriteriaId\":\"42E8C828-0C05-4CD7-BC72-98AC05C6DDE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:columbia-tl00b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02334509-2493-419F-8FF5-E1F1076FB930\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:columbia-tl00d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.178\\\\(c01e178r1p4\\\\)\",\"matchCriteriaId\":\"142A8425-13E2-4215-80B6-80921BA7B3C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:columbia-tl00d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE1BB06-0403-4F46-AF76-DAD85D538907\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.340\\\\(c00e333r1p1t8\\\\)\",\"matchCriteriaId\":\"5BD55A2A-8A54-4E48-B352-F7042BBF2C3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB5193B7-6F3F-4249-BB74-62480893CAB2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:cornell-tl10b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.340\\\\(c01e333r1p1t8\\\\)\",\"matchCriteriaId\":\"F8DF2BE8-65FB-43DF-9FCD-E79C7DF0BB16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:cornell-tl10b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73F60E9A-0ACB-4E44-ADFB-771C695FCF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:dura-al00a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.0.0.190\\\\(c00\\\\)\",\"matchCriteriaId\":\"E79C71B2-0344-4AFA-8AA5-560DE03AF9A4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:dura-al00a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC591FA6-55E1-4628-AE43-CD1E2A4980E9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.194\\\\(c636e3r3p1\\\\)\",\"matchCriteriaId\":\"15E9683F-8037-418C-90AB-7ABDB6BE13BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2BCA7E-E555-45D1-807A-F53682B0C383\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.290\\\\(c185e5r4p1\\\\)\",\"matchCriteriaId\":\"AD39CEB3-C282-4988-A642-58E41C8DDDED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7053C3-4EB2-438E-9544-41ACF7A91057\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:nova_3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.338\\\\(c00e333r1p1t8\\\\)\",\"matchCriteriaId\":\"0F27CB3A-F773-48FB-9CAE-20FC93273D21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:nova_3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF68FFB0-01F8-4937-8BF4-36866F02E9A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:nova_4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.160\\\\(c01e32r2p4\\\\)\",\"matchCriteriaId\":\"FE1E4E8B-0AD9-498D-81F3-13211D9E683E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:nova_4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07D1E240-F1DE-4FC0-84B7-873978A9A6B3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.291\\\\(c185e3r4p1\\\\)\",\"matchCriteriaId\":\"2128BDE5-AE3B-427E-8A25-F3065850206A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E19C33-F393-4E0C-9AA7-461AF50EDF7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.198\\\\(c432e10r3p4\\\\)\",\"matchCriteriaId\":\"43BBA181-3DDA-4BE0-A21E-FCBE2FB39BAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A55CF4F-8E86-419C-845B-CE60070620A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:jakarta-al00a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.251\\\\(c00e106r2p2\\\\)\",\"matchCriteriaId\":\"B12799AD-C7F4-4F02-9BF6-93EB2BE69744\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:jakarta-al00a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44E124FE-9F3E-4A89-9DFB-2ACEF751BA82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:katyusha-al00a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.146\\\\(c00e131r2p2\\\\)\",\"matchCriteriaId\":\"BB6F70FE-53A7-439A-8423-9BA3CB6A9510\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:katyusha-al00a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38E3A00A-6EB8-4E04-B1BC-E7663C9C1EA3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:katyusha-al10a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.160\\\\(c00e150r1p7\\\\)\",\"matchCriteriaId\":\"58FFB71A-0A0A-458E-A035-A353BB4A8894\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:katyusha-al10a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBF2ED42-43B8-4586-913A-62607E458BDC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:madrid-al00a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.261\\\\(c00e120r4p1\\\\)\",\"matchCriteriaId\":\"2FDE93D9-3B6C-4630-AFEF-77184BA570C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:madrid-al00a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE8B2A97-DA47-40C8-8DB5-1AE1A89559A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.380\\\\(c636e1r1p3t8\\\\)\",\"matchCriteriaId\":\"D85AB1CB-E1A8-49C2-A49E-DB0624ACE41B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"143485B2-5216-4190-8306-63D12362F6AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:princeton-al10b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.194\\\\(c00e61r4p11\\\\)\",\"matchCriteriaId\":\"5AC6D9E1-DC06-4CB7-9E0D-8BABCB5F331F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:princeton-al10b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9F930E0-D32C-4D37-8A1D-78D4BFAECF37\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.237\\\\(c00e80r1p7t8\\\\)\",\"matchCriteriaId\":\"96856831-31DE-4853-B1B9-9B666BB861F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A35E71-4D6A-494D-882B-987CE16E3467\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:sydney-tl00_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.237\\\\(c01e80r1p7t8\\\\)\",\"matchCriteriaId\":\"EC6C2354-5777-40FE-99A4-51AF4233B139\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:sydney-tl00:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F4A324E-CF87-4C79-B42A-F5B3B7CEFE6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.159\\\\(c00e64r1p5\\\\)\",\"matchCriteriaId\":\"905B9A20-E643-4E82-B918-6067398A0E25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF9295B5-8194-4AE9-91B3-5AD3C79FB9A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:tony-al00b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.1.0.137\\\\(c00e137r2p11\\\\)\",\"matchCriteriaId\":\"63B310F0-9165-48E3-9609-6CA49D6E10C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:tony-al00b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E14B978-2A3C-4F55-8E3A-BA41AB137C33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:tony-tl00b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.196\\\\(c01e65r2p11\\\\)\",\"matchCriteriaId\":\"8D4E2493-F5E5-4DB3-BD0F-87A8B07A3BBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:tony-tl00b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF11E947-FCDE-4EFD-A14D-5C2BD7BC5A56\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:yale-al00a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.196\\\\(c00e62r8p12\\\\)\",\"matchCriteriaId\":\"0993FFB0-E860-437B-94AF-5D80D7598F5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:yale-al00a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"562D05D2-CC9E-4973-9E8D-B40C0ED6C721\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.202\\\\(c10e3r3p2\\\\)\",\"matchCriteriaId\":\"D8C81625-2725-4B62-9DB5-7FC9B822A51A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9F4FF5-07B8-456E-87C3-DB7C725E20F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:yalep-al10b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.194\\\\(c00e62r8p12\\\\)\",\"matchCriteriaId\":\"9BD65BBE-8AAA-4B67-A9B6-A58A4DD0CF74\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:yalep-al10b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7D81385-913B-4A38-A712-41CAE7B78DF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.177\\\\(c432e3r1p4\\\\)\",\"matchCriteriaId\":\"ECBCD3C2-25B7-431D-8277-E25616008891\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07042814-6B3A-4D7C-A776-02DA9AC9B8DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.202\\\\(c10e3r3p2\\\\)\",\"matchCriteriaId\":\"59A1E3C0-5364-4C4D-BB27-69941AAE68C0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E2BCA7E-E555-45D1-807A-F53682B0C383\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.290\\\\(c431e1r1p8\\\\)\",\"matchCriteriaId\":\"25442A0C-4E81-4417-BC5E-8F9CC71E4AED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7053C3-4EB2-438E-9544-41ACF7A91057\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.290\\\\(c605e6r1p6\\\\)\",\"matchCriteriaId\":\"19E562E7-C11D-4D00-B288-B287EC7BF250\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7053C3-4EB2-438E-9544-41ACF7A91057\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:y6_2019_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.295\\\\(c431e5r2p2\\\\)\",\"matchCriteriaId\":\"671F4E52-9877-40BA-AA8A-377C9DD7431A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:y6_2019:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7053C3-4EB2-438E-9544-41ACF7A91057\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.291\\\\(c432e5r2p1\\\\)\",\"matchCriteriaId\":\"C2224974-8DCD-410A-A072-2D52B26BB56D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E19C33-F393-4E0C-9AA7-461AF50EDF7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.291\\\\(c636e4r4p1\\\\)\",\"matchCriteriaId\":\"4A71A7A6-2220-45F0-B9E0-560632C36EE2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E19C33-F393-4E0C-9AA7-461AF50EDF7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_8a_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1.0.297\\\\(c605e4r4p2\\\\)\",\"matchCriteriaId\":\"E1D1A153-274B-40A2-B9A8-F5E8B83258A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_8a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E19C33-F393-4E0C-9AA7-461AF50EDF7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.200\\\\(c185e3r3p3\\\\)\",\"matchCriteriaId\":\"511131DF-79C4-41A5-A0D3-015A832B2C35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A55CF4F-8E86-419C-845B-CE60070620A3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.0.201\\\\(c10e5r4p3\\\\)\",\"matchCriteriaId\":\"24DC8C7E-C586-4B6C-99A9-808202A7BD55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A55CF4F-8E86-419C-845B-CE60070620A3\"}]}]}],\"references\":[{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en\",\"source\":\"security@android.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2020-03-01\",\"source\":\"security@android.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2020-03-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-0069\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://source.android.com/security/bulletin/2020-03-01\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T05:47:40.759Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-0069\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-07T13:03:30.656110Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2021-11-03\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-0069\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2021-11-03T00:00:00.000Z\", \"value\": \"CVE-2020-0069 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-0069\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-07T13:02:30.660Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Android\", \"versions\": [{\"status\": \"affected\", \"version\": \"Android kernel\"}]}], \"references\": [{\"url\": \"https://source.android.com/security/bulletin/2020-03-01\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en\", \"tags\": [\"x_refsource_CONFIRM\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Elevation of privilege\"}]}], \"providerMetadata\": {\"orgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"shortName\": \"google_android\", \"dateUpdated\": \"2020-05-27T11:06:04.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Android kernel\"}]}, \"product_name\": \"Android\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://source.android.com/security/bulletin/2020-03-01\", \"name\": \"https://source.android.com/security/bulletin/2020-03-01\", \"refsource\": \"MISC\"}, {\"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en\", \"name\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200527-01-mtk-en\", \"refsource\": \"CONFIRM\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Elevation of privilege\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-0069\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@android.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-0069\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:35:49.217Z\", \"dateReserved\": \"2019-10-17T00:00:00.000Z\", \"assignerOrgId\": \"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6\", \"datePublished\": \"2020-03-10T19:56:37.000Z\", \"assignerShortName\": \"google_android\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…