![]() ![]() Usually, these modifications center around attaining root access on devices in order to delete bloatware, install custom software, or tweak default system parameters. SCROLL TO CONTINUE WITH CONTENT The Origin of MediaTek-suįor any readers who aren't familiar with XDA-Developers, we're a site that's home to the largest forums for Android software modifications. Now MediaTek has turned to Google to close this patch gap and secure millions of devices against this critical security exploit. Even worse, the vulnerability is actively being exploited by hackers. ![]() Despite MediaTek making a patch available a month after discovery, the vulnerability is still exploitable on dozens of device models. Although the March 2020 Android Security Bulletin is seemingly the first time that CVE-2020-0069 has been publicly disclosed, details of the exploit have actually been sitting openly on the Internet-more specifically, on the XDA-Developers forums-since April of 2019. One of the vulnerabilities that are documented in the latest bulletin is CVE-2020-0069, a critical security exploit, specifically a rootkit, that affects millions of devices with chipsets from MediaTek, the large Taiwanese chip design company. Today was no exception: Google just made public the Android Security Bulletin for March 2020. On the first Monday of every month, Google publishes the Android Security Bulletin, a page that discloses all the security vulnerabilities and their patches submitted by Google themselves or other third-parties. ![]()
0 Comments
Leave a Reply. |