CVE-2020-0417

7.8 HIGH

📋 TL;DR

This vulnerability allows local privilege escalation on Android devices by bypassing permissions through an empty mutable PendingIntent in the GPS network-initiated handler. It affects Android versions 8.1, 9, and 10, requiring user execution privileges but no user interaction for exploitation.

💻 Affected Systems

Products:
  • Android
Versions: Android 8.1, 9, and 10
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices running the specified Android versions with the vulnerable GPS component enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain elevated system privileges, potentially accessing sensitive data, modifying system settings, or installing malicious apps without user consent.

🟠

Likely Case

Local attackers with limited access could escalate privileges to compromise device integrity or steal user data.

🟢

If Mitigated

With proper patching, the risk is eliminated; without patching, device isolation and minimal user privileges reduce impact.

🌐 Internet-Facing: LOW, as exploitation requires local access to the device, not remote network exploitation.
🏢 Internal Only: MEDIUM, as it poses a risk to internal devices if an attacker gains physical or limited local access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and user execution privileges, but no public proof-of-concept is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin July 2021 patches

Vendor Advisory: https://source.android.com/security/bulletin/2021-07-01

Restart Required: Yes

Instructions:

1. Check for system updates in device settings. 2. Apply the July 2021 Android security patch. 3. Restart the device after installation.

🔧 Temporary Workarounds

Disable GPS network-initiated features

android

Reduce attack surface by disabling GPS services that use network-initiated functionality, though this may impact location services.

🧯 If You Can't Patch

  • Restrict physical and local access to devices to minimize attack opportunities.
  • Implement strict app permissions and monitor for unusual privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version; if it is 8.1, 9, or 10 and not patched with July 2021 updates, it is vulnerable.

Check Version:

adb shell getprop ro.build.version.release

Verify Fix Applied:

Verify the Android security patch level is July 2021 or later in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Look for logs related to GpsNetInitiatedHandler or unexpected permission changes in system logs.

Network Indicators:

  • No specific network indicators, as exploitation is local.

SIEM Query:

Not applicable due to local nature; focus on device logs for privilege escalation events.

🔗 References

📤 Share & Export