Security Experts:

Connect with us

Hi, what are you looking for?


Mobile & Wireless

Android’s January 2020 Update Patches 40 Vulnerabilities

Google on Monday published the first Android security bulletin for 2020, with patches for 40 vulnerabilities, including a critical flaw in the Media framework.

Google on Monday published the first Android security bulletin for 2020, with patches for 40 vulnerabilities, including a critical flaw in the Media framework.

The Android Security Bulletin for January 2020 was split into two parts: the first addresses 7 vulnerabilities in Framework, Media framework, and System, while the second includes fixes for 33 security flaws in Kernel, Qualcomm, and Qualcomm closed-source components.

Six of the seven bugs patched with the 2020-01-01 security patch level are rated high severity, and only one is considered critical risk.

“The most severe of these issues is a critical security vulnerability in Media framework that could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process,” Google explains.

Tracked as CVE-2020-0002, the vulnerability is only considered critical in Android 8.0, 8.1, and 9 releases, but features a moderate risk rating on Android 10.

Of the three flaws patched in Framework, two are elevation of privilege bugs — one affects Android 8.0, 8.1, 9, and 10, while the other only impacts Android 8.0 — and one is a denial of service issue affecting Android 8.0, 8.1, 9, and 10.

All of the three flaws patched in System are information disclosure bugs that impact Android 8.0, 8.1, 9, and 10.

The second part of this month’s Android security update, namely the 2020-01-05 security patch level, includes fixes for four bugs in Kernel components, eleven flaws in Qualcomm components, and eighteen issues in Qualcomm closed-source components.

The most important of these vulnerabilities is a critical flaw in the Realtek rtlwifi driver, which could result in remote code execution.

Google also published a separate security bulletin detailing vulnerabilities addressed in Pixel devices. A total of 37 fixes were included in the bulletin, with 33 of them being the patches from the 2020-01-05 security patch level and the remaining 4 being moderate severity bugs in Camera.

Related: Google Patches Critical DoS Flaw in Android 10

Related: App Found in Google Play Exploits Recent Android Zero-Day

Related: Google Teams Up With Security Firms to Fight Bad Android Apps

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet