8.8
CVSSv3

CVE-2020-0022

Published: 13/02/2020 Updated: 02/02/2024
CVSS v2 Base Score: 8.3 | Impact Score: 10 | Exploitability Score: 6.5
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 742
Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bounds write due to an incorrect bounds calculation. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-143894715

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 8.0

google android 8.1

google android 9.0

google android 10.0

huawei mate_20_firmware

huawei mate_20_pro_firmware

huawei mate_20_x_firmware

huawei p_smart_firmware

huawei p_smart_2019_firmware

huawei p20_firmware

huawei p20_pro_firmware

huawei p30_firmware

huawei p30_pro_firmware

huawei y6_2019_firmware

huawei y6_pro_2019_firmware

huawei y9_2019_firmware

huawei nova_3_firmware

huawei nova_lite_3_firmware

huawei honor_8a_firmware

huawei honor_8x_firmware

huawei honor_view_20_firmware

huawei mate_30_pro_firmware

huawei mate_30_firmware

huawei mate_30_pro_5g_firmware

huawei mate_30_5g_firmware

Vendor Advisories

There is an integer overflow vulnerability in Android affects several Huawei smartphones There is possible out of bounds write due to an incorrect bounds calculation This could lead to remote code execution over Bluetooth with no additional execution privileges needed (Vulnerability ID: HWPSIRT-2020-02120) This vulnerability has been assigned a ...

Exploits

Android suffers from a bluetooth remote denial of service vulnerability ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag <!--X-Subject-Header-End--> <!--X-Head-of-Mes ...

Github Repositories

poc for cve-2020-0022

cve-2020-0022 poc for cve-2020-0022 usage gcc pocc -lbluetooth -o poc poc MAC_ADDR info This poc should be stable on android 810,once it run into truncating packet, crash But it cloud be very unstable, on Samsung s9 plus surely unstable Run poc on raspberry pi 3B has been tested okay run ubuntu/arch with vmware in windows 10 on thinkpad x1c 2018 or ubuntu with pd in mac

Details of CVE-2020-14292

CVE-2020-14292: A bluetooth transport issue in COVIDSafe App Author: Alwen Tiu, The Australian National University Last updated: 2020-09-08 Summary In the COVIDSafe application through 1021 for Android, unsafe use of the Bluetooth transport option in the GATT connection allows attackers to trick the application into establishing a connection over Bluetooth BR/EDR transport, w

CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)

######################################################################################## CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami Android TV 80 - ARM32 Cortex A9 By Polo35 - 2020/08/24 ######################################################################################## "Usage: python polo_exploitpy target_bt_mac [target_adb_ip, shell_command, d

This is a RCE bluetooth vulnerability on Android 8.0 and 9.0

Bluefrag_CVE-2020-0022 This is a RCE bluetooth vulnerability on Android 80 and 90 The test python scripts in the folder cve-2020-0022 are from insinuatornet/2020/04/cve-2020-0022-an-android-8-0-9-0-bluetooth-zero-click-rce-bluefrag/ The original download hyperlink is insinuatornet/wp-content/uploads/2020/04/cve_2020_0022_exporttar-1gz Other crash script r

AndroidBlueFragCVE CVE 2020-0022 Android Bluetooth Zero Click RCE/ BlueFrag kasra abdollahi: 97106121 mohammad heydari: 97110071

cve-2020-0022相关的一些东西

cve-2020-0022 cve-2020-0022相关的一些东西

cve-2020-0022

cve-2020-0022 poc for cve-2020-0022 usage gcc pocc -lbluetooth -o poc poc MAC_ADDR info This poc should be stable on android 810,once it run into truncating packet, crash But it cloud be very unstable, on Samsung s9 plus surely unstable Run poc on raspberry pi 3B has been tested okay run ubuntu/arch with vmware in windows 10 on thinkpad x1c 2018 or ubuntu with pd in mac

BlueFrag experiments

CVE-2020-0022 Seems like Android 9-6 have similar Bluetooth subsystem, Android 5 and 4 are different Android 90 BlueFrag experiments Patch: androidgooglesourcecom/platform/system/bt/+/3cb7149d8fed2d7d77ceaa95bf845224c4db3baf Below I hit the patched condition OK I think I got it, but somehow I cannot crash the process hmmmm Actually, managed to get signed length

A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)

CVE-2020-0022 Many thanks to Insinuator for their amazing blog post and code! Results All the steps mentioned in the insinuator post have been completed, and more These are a lot of steps to put in a READMEmd file, so feel free to check out the post from Insinuator mentioned above The exploit is fully complete up to the point where: The address attacker-controlled sufficien

Broadcom and Cypress firmware emulation for fuzzing and further full-stack debugging

Frankenstein provides a virtual environment to fuzz wireless firmwares Firmwares can be hooked during runtime to extract their current state (ie, xmitstate through InternalBlue) Then, they can be re-executed in a virtual environment for fuzzing To do so, the firmware image needs to be reassembled to an ELF file that can be executed with QEMU The firmware image reassembly

Recent Articles

Android owners – you'll want to get these latest security patches, especially for this nasty Bluetooth hijack flaw
The Register • Shaun Nichols in San Francisco • 07 Feb 2020

'Pwned with a broadcast' bug among 25 to be patched by Google Here we go again: Software nasties slip into Google Play, exploit make-me-root Android flaw for maximum pwnage

Google has posted the February security updates for Android, including for a potentially serious remote code execution flaw in Bluetooth. Designated CVE-2020-0022, the flaw was discovered and reported by researchers with German company ERNW who say a fix has been in the works since November. "On Android 8.0 to 9.0, a remote attacker within proximity can silently execute arbitrary code with the privileges of the Bluetooth daemon as long as Bluetooth is enabled," the team explained. "No user inter...