CVE-2020-0034
📋 TL;DR
This CVE describes an out-of-bounds read vulnerability in Android's VP8 video decoder. An attacker could remotely disclose information from affected devices without user interaction if error correction is enabled. Only Android 8.0 and 8.1 devices are affected.
💻 Affected Systems
- Android
📦 What is this software?
Android by Google
Android by Google
⚠️ Risk & Real-World Impact
Worst Case
Remote information disclosure allowing attacker to read sensitive memory contents from the device, potentially exposing credentials, personal data, or other sensitive information.
Likely Case
Information disclosure of limited memory contents, potentially revealing device state or application data, but not full system compromise.
If Mitigated
No impact if error correction is disabled or device is patched; information disclosure prevented.
🎯 Exploit Status
Requires specially crafted VP8 video file and error correction enabled; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Android Security Bulletin March 2020 patches
Vendor Advisory: https://source.android.com/security/bulletin/2020-03-01
Restart Required: Yes
Instructions:
1. Check for Android system updates in Settings > System > Advanced > System update. 2. Install March 2020 or later security patch. 3. Reboot device after installation.
🔧 Temporary Workarounds
Disable error correction for video playback
androidPrevents exploitation by disabling the error correction feature required for the vulnerability
Block untrusted video sources
allPrevent loading VP8 video from untrusted sources like unknown websites or messaging apps
🧯 If You Can't Patch
- Disable automatic video playback in browsers and messaging apps
- Use alternative video players that don't use the vulnerable Android VP8 decoder
🔍 How to Verify
Check if Vulnerable:
Check Android version in Settings > About phone > Android version. If version is 8.0 or 8.1, device is potentially vulnerable.
Check Version:
adb shell getprop ro.build.version.release
Verify Fix Applied:
Check security patch level in Settings > About phone > Android security patch level. March 2020 or later indicates patched.
📡 Detection & Monitoring
Log Indicators:
- Media server crashes
- Video playback errors with VP8 content
- Memory access violation logs
Network Indicators:
- Unusual video file downloads to Android devices
- VP8 video traffic to/from Android devices
SIEM Query:
source="android_logs" AND (process="mediaserver" OR process="media.codec") AND (message="*out of bounds*" OR message="*memory violation*")
🔗 References
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00048.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00024.html
- https://source.android.com/security/bulletin/2020-03-01
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00048.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00024.html
- https://source.android.com/security/bulletin/2020-03-01