CVE-2020-26597

7.5 HIGH

📋 TL;DR

This vulnerability in LG Android devices allows attackers to cause denial of service through Wi-Fi subsystem crashes due to incorrect input validation. It affects LG mobile devices running Android 9.0 and 10. The issue requires proximity to the target device via Wi-Fi.

💻 Affected Systems

Products:
  • LG mobile devices
Versions: Android 9.0 and 10
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specific LG device models not specified in CVE. Requires Wi-Fi enabled and within range.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Persistent denial of service rendering the device's Wi-Fi functionality unusable, potentially requiring factory reset or physical repair.

🟠

Likely Case

Temporary Wi-Fi disconnection and device instability requiring reboot to restore functionality.

🟢

If Mitigated

Limited impact with proper network segmentation and Wi-Fi security controls in place.

🌐 Internet-Facing: LOW (requires physical proximity via Wi-Fi, not directly internet exploitable)
🏢 Internal Only: MEDIUM (could be exploited by malicious actors within Wi-Fi range in corporate environments)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted Wi-Fi packets to target device. No authentication needed but requires proximity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2020 security update (LVE-SMP-200022)

Vendor Advisory: https://lgsecurity.lge.com/

Restart Required: Yes

Instructions:

1. Check for system updates in device Settings. 2. Install October 2020 or later security update. 3. Reboot device after installation.

🔧 Temporary Workarounds

Disable Wi-Fi when not needed

android

Turn off Wi-Fi functionality to prevent exploitation

Settings > Network & Internet > Wi-Fi > Toggle OFF

Use trusted Wi-Fi networks only

android

Configure device to connect only to known, secure Wi-Fi networks

Settings > Network & Internet > Wi-Fi > Network preferences > Turn off 'Connect to open networks'

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable devices
  • Deploy Wi-Fi intrusion detection systems to monitor for malicious packets

🔍 How to Verify

Check if Vulnerable:

Check Android version in Settings > About phone > Android version. If version is 9.0 or 10 and security patch level is before October 2020, device is vulnerable.

Check Version:

Settings > About phone > Android version and Android security patch level

Verify Fix Applied:

Verify security patch level is October 2020 or later in Settings > About phone > Android security patch level.

📡 Detection & Monitoring

Log Indicators:

  • Wi-Fi subsystem crashes
  • Kernel panic logs
  • Unexpected Wi-Fi disconnections

Network Indicators:

  • Unusual Wi-Fi packet patterns
  • Malformed Wi-Fi frames targeting LG devices

SIEM Query:

source="android_logs" AND ("Wi-Fi crash" OR "kernel panic" OR "wlan0 error")

🔗 References

📤 Share & Export