CVE-2020-0460

7.5 HIGH

📋 TL;DR

This vulnerability in Android's certificate installer allows improperly installed certificates due to a logic error, potentially enabling remote information disclosure without requiring user interaction or additional privileges. It affects Android 11 devices, allowing attackers to intercept or manipulate encrypted communications.

💻 Affected Systems

Products:
  • Android
Versions: Android 11
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the default certificate installer in Android 11; no special configurations are required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could install malicious certificates to intercept and decrypt HTTPS traffic, leading to data theft, man-in-the-middle attacks, or credential compromise.

🟠

Likely Case

Exploitation could result in unauthorized access to sensitive data transmitted over networks, such as login credentials or personal information.

🟢

If Mitigated

With proper controls like network segmentation and certificate pinning, the risk is reduced to minimal, limiting exposure to internal threats.

🌐 Internet-Facing: MEDIUM, as exploitation requires network access but no user interaction, though it depends on attacker proximity to the target.
🏢 Internal Only: HIGH, as internal attackers could exploit this more easily to intercept internal communications without detection.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access but no authentication or user interaction, making it relatively straightforward for skilled attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android Security Bulletin December 2020 or later

Vendor Advisory: https://source.android.com/security/bulletin/2020-12-01

Restart Required: Yes

Instructions:

1. Check for system updates in Android Settings. 2. Install the December 2020 security patch or later. 3. Restart the device to apply the update.

🔧 Temporary Workarounds

Disable certificate installation

android

Prevent installation of new certificates to block exploitation, but this may break legitimate certificate management.

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable devices from untrusted networks.
  • Use certificate pinning in apps to prevent acceptance of unauthorized certificates.

🔍 How to Verify

Check if Vulnerable:

Check the Android version in Settings > About phone; if it is Android 11 and not updated with the December 2020 patch, it is vulnerable.

Check Version:

On Android, use 'adb shell getprop ro.build.version.release' to check the OS version.

Verify Fix Applied:

Verify the security patch level in Settings > About phone > Android version; ensure it includes December 2020 or later.

📡 Detection & Monitoring

Log Indicators:

  • Look for unusual certificate installation events in system logs or security logs.

Network Indicators:

  • Monitor for unexpected SSL/TLS certificate changes or man-in-the-middle attack patterns in network traffic.

SIEM Query:

Example: 'event_category:certificate_install AND os_version:Android-11' to detect potential exploitation attempts.

🔗 References

📤 Share & Export