Bluetooth hijack bug among 25 Android flaws patched in February
Attackers could have exploited the flaw on older systems to execute arbitrary code on target devices


Google has issued a collection of security updates to its Android mobile OS including patching a critically severe Bluetooth hijacking vulnerability that was first flagged to the developer in November last year.
The flaw, dubbed CVE-2020-0022, could have allowed an attacker, within range of Bluetooth signal, to execute arbitrary code with privileges of the Bluetooth daemon so long as Bluetooth is enabled on a vulnerable device.
This form of attack could have been executed by knowing just the Bluetooth MAC address of the target device, which could have, for some devices, been derived from the Wi-Fi MAC address, according to researchers with security firm ERNW.
The flaw, which was first flagged on 3 November 2019, affects older versions of Android, although it’s not exploitable for technical reasons on Android 10, and results instead in a crash of the Bluetooth daemon.
“On Android 8.0 to 9.0, a remote attacker within proximity can silently execute arbitrary code with the privileges of the Bluetooth daemon as long as Bluetooth is enabled,” the ERNW researchers said.
“No user interaction is required and only the Bluetooth MAC address of the target devices has to be known. For some devices, the Bluetooth MAC address can be deduced from the WiFi MAC address. This vulnerability can lead to theft of personal data and could potentially be used to spread malware (Short-Distance Worm).”
RELATED RESOURCE
Report: The State of Software Security
This annual report explores important trends in software security
The collection of security updates also includes two dozen further patches for Android bugs ranging in severity from moderate to critical, although the vast majority of flaws are rated as being ‘highly’ severe.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
There are several elevation of privilege bugs in the batch, as well as a moderate denial of service bug and a critically-rated information disclosure vulnerability.
Users have been advised to update their devices as soon as possible to receive the latest security updates, although there are a handful of mitigations users can employ.
The researchers who initially discovered the bug have urged all Android users to enable Bluetooth if only strictly necessary, and to keep their devices non-discoverable.
They have pledged to release the technical report on the vulnerability, as well as the proof of concept code, one they’re confident that patches have reached end users.
While Bluetooth vulnerabilities in mobile phones are unusual, researchers found a flaw in Google’s Titan security keys last year that could allow attackers to bypass encryption and hijack user accounts.
Discovered in May 2019, the flaw involved a misconfigured Bluetooth pairing protocol with the FIDO key, with non-Bluetooth devices unaffected.
In August, meanwhile, researchers discovered a flaw in Bluetooth authentication protocols that allowed hackers to listen in on conversations held over Bluetooth devices, or even change the contents of file transfers.
The attack, dubbed Key Negotiation of Bluetooth (KNOB), worked by forcing participants in a Bluetooth handshake to use an encryption key with just one byte of entropy, allowing an attacker to brute-force the key.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Hackers are targeting Ivanti VPN users again – here’s what you need to know
News Ivanti has re-patched a security flaw in its Connect Secure VPN appliances that's been exploited by a China-linked espionage group since at least the middle of March.
By Emma Woollacott Published
-
Broadcom issues urgent alert over three VMware zero-days
News The firm says it has information to suggest all three are being exploited in the wild
By Solomon Klappholz Published
-
Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim
News Over 200 vulnerable Nakivo backup instances have been identified months after the firm silently patched a security flaw.
By Solomon Klappholz Published
-
Everything you need to know about the Microsoft Power Pages vulnerability
News A severe Microsoft Power Pages vulnerability has been fixed after cyber criminals were found to have been exploiting unpatched systems in the wild.
By Solomon Klappholz Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
A critical Ivanti flaw is being exploited in the wild – here’s what you need to know
News Cyber criminals are actively exploiting a critical RCE flaw affecting Ivanti Connect Secure appliances
By Solomon Klappholz Published
-
Researchers claim an AMD security flaw could let hackers access encrypted data
News Using only a $10 test rig, researchers were able to pull off the badRAM attack
By Solomon Klappholz Published
-
A journey to cyber resilience
whitepaper DORA: Ushering in a new era of cyber security
By ITPro Published