Android Devices With MediaTek Chips Need Security Update This Month ASAP
While everyone should always get the latest security updates for their Android devices whenever possible, you need to pay special attention to this month’s update and get it right away if your device has any MediaTek chips inside.
To keep things simple, here is a list of affected devices, courtesy of XDA-Developers , where the MediaTek security exploit was originally discovered. (More on this later.) 93 devices in total; If yours is not on this list, or you want to double check that you are affected, you can see if these ADB commands are running successfully on your device. If so, your MediaTek chip could be used to give an attacker root access to your device.
As for this list:
- Acer Iconia One 10 B3-A30
- Acer Iconia One 10 B3-A40
- Alba Tablet Series
- Alcatel 1 5033 Series
- Alcatel 1C
- Alcatel 3L (2018) 5034 series
- Alcatel 3T 8
- Alcatel A5 LED 5085 series
- Alcatel A30 5049 Series
- Alcatel Idol 5
- Alcatel / TCL A1 A501DL
- Alcatel / TCL LX A502DL
- Alcatel Tetra 5041C
- Amazon Fire 7 2019 – up to Fire OS 6.3.1.2 build 0002517050244 only
- Amazon Fire HD 8 2016 – up to Fire OS 5.3.6.4 only, Build 626533320
- Amazon Fire HD 8 2017 – Up to Fire OS 5.6.4.0 Only Build 636558520
- Amazon Fire HD 8 2018 – up to Fire OS 6.3.0.1 only
- Amazon Fire HD 10 2017 – Up to Fire OS 5.6.4.0 Only Build 636558520
- Amazon Fire HD 10 2019 – up to Fire OS 7.3.1.0 only
- Amazon Fire TV 2 – up to Fire OS 5.2.6.9 only
- ASUS ZenFone Max Plus X018D
- ASUS ZenPad 3s 10 Z500M
- ASUS ZenPad Z3xxM (F) Based on MT8163 Series
- Barnes & Noble NOOK 7 ″ BNTV450 and BNTV460 Tablet
- Barnes & Noble NOOK 10.1 “BNTV650 Tablet
- Blackview a8 max
- Blackview BV9600 Pro (Helio P60)
- Blue Life Max
- BLU Life One X
- BLU R1 series
- BLU R2 LTE
- BLU S1
- Xtreme Pro Blue Tank
- BLU Vivo 8L
- BLU Vivo XI
- BLU Vivo XL4
- Bluboo S8
- BQ Aquaris M8
- CAT S41
- Coolpad Cool Play 8 Lite
- Dragon’s Touch K10
- Echo feeling
- Gionee m7
- HiSense Infinity H12 Lite
- Huawei GR3 TAG-L21
- Huawei Y5II
- Huawei Y6II MT6735 Series
- Lava Iris 88S
- Lenovo C2 Series
- Lenovo Tab E8
- Lenovo Tab2 A10-70F
- LG K8 + (2018) X210ULMA (MTK)
- LG K10 (2017)
- LG Tribute Dynasty
- LG X power 2 / M320 series (MTK)
- LG Xpression Plus 2 / K40 LMX420 Series
- Lumigon T3
- Meizu M5c
- Meizu M6
- Meizu Pro 7 Plus
- Nokia 1
- Nokia 1 Plus
- Nokia 3
- Nokia 3.1
- Nokia 3.1 Plus
- Nokia 5.1
- Nokia 5.1 Plus / X5
- Onn 7 ″ Android Tablet
- Onn 8 “& 10” Tablet Series (MT8163)
- OPPO A5s
- OPPO F5 series / A73 – Android 8.x only
- OPPO F7 Series – Android 8.x Only
- OPPO F9 Series – Android 8.x Only
- Oukitel K12
- D7 protrusion
- Realme 1
- Sony Xperia C4
- Sony Xperia C5 Series
- Sony Xperia L1
- Sony Xperia L3
- Sony Xperia XA Series
- Sony Xperia XA1 Series
- South Telecom Smartab ST1009X (MT8167)
- TECNO Spark 3 Series
- Umidigi F1 series
- Umidigi Power
- Wiko ride
- Vico Sunny
- Wiko View3
- Xiaomi Redmi 6 / 6A Series
- ZTE Blade A530
- ZTE Blade D6 / V6
- ZTE Quest 5 Z3351S
Make sure you have the March 2020 Google security update installed on your device as soon as it becomes available for your device, because the MediaTek-su exploit as it is known allows an attacker to root your device simply by running a script. It doesn’t sound so scary on paper, but a post from XDA-Developers explains why this is so important:
… the typical way to get root access on an Android device is to unlock the bootloader first, which disables checking the boot partition. After unlocking the bootloader, the user can enter the superuser binary into the system as well as the superuser management application to control which processes have root access. Unlocking the bootloader intentionally disables one of the key security features on the device, so the user must explicitly allow this, usually by turning on the toggle in the developer options and then sending the unlock command to the bootloader. However, with MediaTek-su, the user does not need to unlock the bootloader to gain root access. Instead, all they have to do is copy the script to their device and execute it in the shell. However, not only the user can do this. Any application on your phone can copy the MediaTek-su script to its personal directory and then execute it to get root access in the shell.
MediaTek-su’s only weakness isn’t that great; the malicious app would have to set up a script that runs every time the device is turned on, since rebooting Android removes temporary root privileges. However, it won’t be difficult for a seasoned attacker to overcome this, and an app that has root access to your device has basically revoked its defenses. Not only can he grant himself all the permissions he needs without your input or confirmation, but he can also install any apps he wants in the background of your device without even knowing about them.
In other words: when an app you don’t need on your device suddenly gets rooted on your device, it can turn your Android life into hell. All the technical details are fascinating if you want to dig into the XDA-Developers article, but the end result is the same: check and install the monthly Android security update as soon as you can . Open Settings, click on System and look for the Android update option, which may be obvious or hidden in the advanced menu (depending on your device).