Android Flaw Allows Remote Code Execution Across Versions, May 2020 Security Update Fixes It

The CVE-2020-0103 flaw could allow for remote code execution, and it affects all Android OS builds utilizing security patch levels issued prior to May 5.

Advertisement
By Tasneem Akolawala | Updated: 6 May 2020 18:46 IST
Highlights
  • The CVE-2020-0103 which could allow for remote code execution
  • Damage depends on the privileges associated with the app
  • CIS advises caution before installing unverified apps from Play Store

CIS notes that the bug has not been exploited in the wild

Google has patched several bugs in its May 2020 Android security patch. These vulnerabilities are reported to pose high risk for consumers as well as business and government institutions – if exploited. The critical severity flaw CVE-2020-0103, in particular, could allow for remote code execution. It affects all Android OS builds utilising security patch levels issued prior to May 5. Centre for Internet Security (CIS) has listed a total of 39 high risk vulnerabilities in Google's Android OS that were patched in recent update by Google. The organisation notes that fixes for all of these vulnerabilities have been rolled out by Google with May 2020 patch, but other OEMs are yet to roll it out to their phones.

CIS has listed 39 Android OS vulnerabilities in its blog post that pose high risk to small, medium, and large businesses and government organisations. The organisation notes that there are currently no reports of these vulnerabilities being exploited in the wild. The most severe of these vulnerabilities is CVE-2020-0103 which could allow for remote code execution.

The remote code execution vulnerability in CVE-2020-0103 was not detailed on the CVE Mitre site by NVD, but Google in its security bulletin on May 1 noted, "The most severe of these issues is a critical security vulnerability in the System component that could enable a remote attacker using a specially crafted transmission to execute arbitrary code within the context of a privileged process."

Advertisement

CIS adds, “Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of a privileged process. These vulnerabilities could be exploited through multiple methods such as email, web browsing, and MMS when processing media files.” However the damage caused by these bugs varies based on the privileges associated with malicious apps. In the worst case scenario, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights.

Advertisement

Google Updates Chrome After Spotting 'Critical' Security Vulnerability

“If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights,” CIS adds.

Advertisement

The latest Android Bulletin notes that all of these vulnerabilities have been patched with the latest May 2020 Android security patch dated May 5. Out of the 39 vulnerabilities, 36 were classified as high-severity, 1 was classified moderate, and 2 were classified as critical. Apart from CVE-2020-0103, the other critical-severity flaw (CVE-2020-3641) was in Qualcomm closed source component, and has not yet been detailed.

CIS advises OEMS to apply appropriate updates by Google or mobile carriers to vulnerable systems, immediately after appropriate testing. It also recommends users to download only trusted vendor apps via Google Play Store. Users should exercise caution and evaluate before visiting un-trusted websites or follow links provided by unknown or un-trusted sources. For those who are aware of best security practices must inform and educate others regarding threats posed by hypertext links contained in un-trusted emails or attachments.

Advertisement

Hackers Exploiting Bug in Microsoft Email Servers

As mentioned, Google has rolled out the May 2020 Android security patch to Pixel devices already.


How are we staying sane during this Coronavirus lockdown? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts or RSS, download the episode, or just hit the play button below.

 

For details of the latest launches and news from Samsung, Xiaomi, Realme, OnePlus, Oppo and other companies at the Mobile World Congress in Barcelona, visit our MWC 2025 hub.

Further reading: Google, Android Vulnerability
Advertisement

Related Stories

Popular Mobile Brands
  1. MacBook Neo Launched in India With 13-Inch Display, A18 Pro Chip: See Price
  2. iPhone 17e vs iPhone 17: Price in India, Features, Specifications Compared
  3. Samsung Galaxy A37, Galaxy A57 Get Better Geekbench Scores Ahead of Debut
  1. Hubble Constant Puzzle Deepens as Supernova and CMB Measurements Clash
  2. MacBook Neo Launched in India With 13-Inch Liquid Retina Display, Apple's A18 Pro Chip: Price, Specifications
  3. Samsung Galaxy A37, Galaxy A57 Spotted on Geekbench With Better Results Ahead of Anticipated Launch
  4. Vivo X300 FE Launched With Snapdragon 8 Gen 5, 50-Megapixel Telephoto Camera: Price, Features
  5. Vivo V70 FE Colour Options, Key Specifications Revealed Ahead of March 9 Launch
  6. Apple MacBook Neo Reportedly Listed on Regulatory Site Hours Before Anticipated Launch
  7. Tecno Pop X Launched in India With 5,000mAh Battery, IP64 Rating: Price, Specifications
  8. Tecno Megapad 2, Tecno Watch GT 1S and Tecno FreeHear 2 Unveiled at MWC 2026: Availability, Features
  9. Mike & Nick & Nick & Alice OTT Release Date: Know When and Where to Watch it Online
  10. MediaTek Showcases AI Glasses at MWC 2026; Demonstrates Emergency Satellite Alerts With Starlink
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.