CVE-2020-0413

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to read memory beyond intended boundaries in Android's Bluetooth stack, potentially exposing sensitive information. It affects Android devices running versions 8.0 through 11 without requiring user interaction or additional privileges.

💻 Affected Systems

Products:
  • Android
Versions: 8.0, 8.1, 9, 10, 11
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: All Android devices with Bluetooth enabled running affected versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker could read sensitive memory contents from Bluetooth server, potentially exposing encryption keys, authentication tokens, or other protected data.

🟠

Likely Case

Information disclosure of Bluetooth-related data, potentially including device identifiers, connection states, or limited memory contents.

🟢

If Mitigated

No impact if patched; limited impact if Bluetooth is disabled or device is not discoverable.

🌐 Internet-Facing: LOW (requires Bluetooth proximity, not internet connectivity)
🏢 Internal Only: MEDIUM (requires attacker to be within Bluetooth range of vulnerable device)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity and knowledge of Bluetooth protocol, but no authentication or user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin October 2020 patches

Vendor Advisory: https://source.android.com/security/bulletin/2020-10-01

Restart Required: Yes

Instructions:

1. Check for Android system updates in Settings > System > Advanced > System update. 2. Install available security updates. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable Bluetooth

all

Turn off Bluetooth to prevent exploitation

adb shell settings put global bluetooth_on 0
Settings > Connected devices > Connection preferences > Bluetooth > Turn off

Disable Bluetooth discovery

all

Make device non-discoverable to reduce attack surface

adb shell am start -a android.bluetooth.adapter.action.REQUEST_DISCOVERABLE --ei android.bluetooth.adapter.extra.DISCOVERABLE_DURATION 0
Settings > Connected devices > Connection preferences > Bluetooth > Device name > Turn off 'Make device discoverable'

🧯 If You Can't Patch

  • Disable Bluetooth when not in use
  • Limit Bluetooth usage to trusted devices only

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version. If version is 8.0-11 and security patch level is before October 2020, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.release && adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level is October 2020 or later in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Bluetooth connection attempts
  • Multiple failed GATT protocol requests
  • Bluetooth stack errors or crashes

Network Indicators:

  • Suspicious Bluetooth Low Energy (BLE) traffic patterns
  • Unusual GATT characteristic read attempts

SIEM Query:

source="android_logs" AND ("gatt_process_read_by_type_rsp" OR "bluetooth stack error" OR "CVE-2020-0413")

🔗 References

📤 Share & Export