{"vulnerability": "CVE-2020-0069", "sightings": [{"uuid": "e3722f2d-f0eb-41f1-b4f4-143519e6dd30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:16.000000Z"}, {"uuid": "48776739-bcb0-451e-9bc5-98acf8fb052d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "f0e2729b-4ca2-4c97-83f6-a9f8405b48a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971159", "content": "", "creation_timestamp": "2024-12-24T20:25:08.448085Z"}, {"uuid": "44c43e6e-cb6c-408a-bdfc-98ea66a1a29e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971160", "content": "", "creation_timestamp": "2024-12-24T20:25:09.465418Z"}, {"uuid": "57c6ec31-e7a0-4aa1-81db-6d84daa3ce2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971161", "content": "", "creation_timestamp": "2024-12-24T20:25:10.356105Z"}, {"uuid": "5faaa7c9-467a-43c6-a09e-4a4e2f16be37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "exploited", "source": "https://t.me/androidMalware/710", "content": "Temp root vulnerability that affects millions of devices with chipsets from MediaTek - CVE-2020-0069\n\nExploit has been available on XDA-Developers forums since April 2019.\nThe vulnerability is actively being exploited in the wild.\nhttps://www.xda-developers.com/mediatek-su-rootkit-exploit/", "creation_timestamp": "2020-03-03T06:33:39.000000Z"}, {"uuid": "e423d0e2-f1db-48ae-9654-cee46e1f4445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-0069", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/09b10289-95c7-485d-8b5d-6553c60c883c", "content": "", "creation_timestamp": "2026-02-02T12:28:34.736324Z"}, {"uuid": "7a620464-9d02-4289-b8ae-0b11d2e03fe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "exploited", "source": "https://t.me/techpwnews/243", "content": "CVE-2020-0069: Autopsy of the Most Stable MediaTek Rootkit\n\nIn March 2020, Google patched a critical vulnerability affecting many MediaTek based devices. This vulnerability had been known by MediaTek since April 2019, and later exploited in the wild! In this post, we give some details about this vulnerability and see how we can use it to achieve kernel memory reads and writes.\n\nContinue reading at Quarkslab's blog", "creation_timestamp": "2020-03-26T15:06:00.000000Z"}, {"uuid": "e0a15df9-9f39-4b45-8324-3eaaf79d54cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:44.000000Z"}, {"uuid": "0bf91e27-5081-4485-973e-5a672286f275", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "seen", "source": "https://t.me/arpsyndicate/1291", "content": "#ExploitObserverAlert\n\nCVE-2020-0069\n\nDESCRIPTION: Exploit Observer has 11 entries related to CVE-2020-0069. In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754\n\nFIRST-EPSS: 0.001110000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-04T20:00:41.000000Z"}, {"uuid": "e869d0a1-4d49-4d10-a95c-daf9ff2d3710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/734", "content": "Autopsy of the Most Stable MediaTek Rootkit CVE-2020-0069\nhttps://blog.quarkslab.com/cve-2020-0069-autopsy-of-the-most-stable-mediatek-rootkit.html", "creation_timestamp": "2020-03-24T16:08:58.000000Z"}, {"uuid": "439c6914-2422-4bdc-acfb-b27b2b3ec4d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "exploited", "source": "https://t.me/information_security_channel/35588", "content": "Google patches a critical vulnerability with MediaTek rootkit chips that affect millions of devices with chipsets from MediaTek. MediaTek is a large Taiwanese chip design company that provides chips for wireless communications, High-definition television, and devices like smartphones and tablets. MediaTek bug The vulnerability tracked as CVE-2020-0069 discovered first by members of the XDA developers [\u2026]\nThe post Google Patches the Critical MediaTek rootkit Vulnerability that Affects Millions of Android Devices (https://gbhackers.com/mediatek-rootkit-vulnerability/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-03-04T07:16:40.000000Z"}, {"uuid": "f101677a-2cc8-413a-9095-ad776d33ec83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0069", "type": "exploited", "source": "https://t.me/SecLabNews/7007", "content": "\u041c\u0430\u0440\u0442\u043e\u0432\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 Google \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Android-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0441 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u043c\u0438 MediaTek. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2020-0069 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 \u0441\u0443\u043f\u0435\u0440\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 Nokia, Amazon, BLU, Sony, ZTE \u0438 \u043f\u0440.    \n\u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Android-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0441 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u043c\u0438 MediaTek", "creation_timestamp": "2020-03-03T11:00:02.000000Z"}]}