In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754

Project Subscriptions

Vendors Products
Android Subscribe
Berkeley-l09 Subscribe
Berkeley-l09 Firmware Subscribe
Columbia-al10b Subscribe
Columbia-al10b Firmware Subscribe
Columbia-l29d Subscribe
Columbia-l29d Firmware Subscribe
Columbia-tl00b Subscribe
Columbia-tl00b Firmware Subscribe
Columbia-tl00d Subscribe
Columbia-tl00d Firmware Subscribe
Cornell-al00a Subscribe
Cornell-al00a Firmware Subscribe
Cornell-tl10b Subscribe
Cornell-tl10b Firmware Subscribe
Dura-al00a Subscribe
Dura-al00a Firmware Subscribe
Honor 20 Pro Subscribe
Honor 20 Pro Firmware Subscribe
Honor 8a Subscribe
Honor 8a Firmware Subscribe
Honor View 20 Subscribe
Honor View 20 Firmware Subscribe
Jakarta-al00a Subscribe
Jakarta-al00a Firmware Subscribe
Katyusha-al00a Subscribe
Katyusha-al00a Firmware Subscribe
Katyusha-al10a Subscribe
Katyusha-al10a Firmware Subscribe
Madrid-al00a Subscribe
Madrid-al00a Firmware Subscribe
Nova 3 Firmware Subscribe
Nova 4 Firmware Subscribe
Paris-l29b Subscribe
Paris-l29b Firmware Subscribe
Princeton-al10b Subscribe
Princeton-al10b Firmware Subscribe
Sydney-al00 Subscribe
Sydney-al00 Firmware Subscribe
Sydney-tl00 Subscribe
Sydney-tl00 Firmware Subscribe
Sydneym-al00 Subscribe
Sydneym-al00 Firmware Subscribe
Tony-al00b Subscribe
Tony-al00b Firmware Subscribe
Tony-tl00b Subscribe
Tony-tl00b Firmware Subscribe
Y6 2019 Subscribe
Y6 2019 Firmware Subscribe
Yale-al00a Subscribe
Yale-al00a Firmware Subscribe
Yale-l21a Subscribe
Yale-l21a Firmware Subscribe
Yalep-al10b Subscribe
Yalep-al10b Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-1576 In the ioctl handlers of the Mediatek Command Queue driver, there is a possible out of bounds write due to insufficient input sanitization and missing SELinux restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147882143References: M-ALPS04356754
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Fri, 07 Feb 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2025-10-21T23:35:49.217Z

Reserved: 2019-10-17T00:00:00.000Z

Link: CVE-2020-0069

cve-icon Vulnrichment

Updated: 2024-08-04T05:47:40.759Z

cve-icon NVD

Status : Analyzed

Published: 2020-03-10T20:15:21.947

Modified: 2025-10-23T14:52:54.557

Link: CVE-2020-0069

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses