Page 39 of 265 results (0.005 seconds)

CVSS: 4.7EPSS: 0%CPEs: 2EXPL: 2

The ASUS ZenFone 3 Max Android device with a build fingerprint of asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contains a pre-installed app with a package name of com.asus.loguploader (versionCode=1570000275, versionName=7.0.0.55_170515). This app contains an exported service app component named com.asus.loguploader.LogUploaderService that, when accessed with a particular action string, will write a bugreport (kernel log, logcat log, and the state of system services including the text of active notifications), Wi-Fi Passwords, and other system data to external storage (sdcard). Any app with the READ_EXTERNAL_STORAGE permission on this device can read this data from the sdcard after it has been dumped there by the com.asus.loguploader. Third-party apps are not allowed to directly create a bugreport or access the user's stored wireless network credentials. El dispositivo Android ASUS ZenFone 3 Max con una huella digital asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contiene una aplicación preinstalada, cuyo paquete se denomina com.asus.loguploader (versionCode=1570000275, versionName=7.0.0.55_170515). • https://www.kryptowire.com/portal/android-firmware-defcon-2018 https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

The ASUS ZenFone 3 Max Android device with a build fingerprint of asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contains a pre-installed platform app with a package name of com.asus.dm (versionCode=1510500200, versionName=1.5.0.40_171122) has an exposed interface in an exported service named com.asus.dm.installer.DMInstallerService that allows any app co-located on the device to use its capabilities to download an arbitrary app over the internet and install it. Any app on the device can send an intent with specific embedded data that will cause the com.asus.dm app to programmatically download and install the app. For the app to be downloaded and installed, certain data needs to be provided: download URL, package name, version name from the app's AndroidManifest.xml file, and the MD5 hash of the app. Moreover, any app that is installed using this method can also be programmatically uninstalled using the same unprotected component named com.asus.dm.installer.DMInstallerService. El dispositivo Android ASUS ZenFone 3 Max con una huella digital de asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contiene una app de plataforma preinstalada de nombre com.asus.dm (versionCode=1510500200, versionName=1.5.0.40_171122) que tiene una interfaz expuesta en un servicio exportado llamado com.asus.dm.installer.DMInstallerService que permite que cualquier app ubicada en el dispositivo emplee sus capacidades para descargar una app arbitraria por Internet y la instale. • https://www.kryptowire.com/portal/android-firmware-defcon-2018 https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 3

The Asusgio low-level driver in ASUS Aura Sync v1.07.22 and earlier exposes functionality to read and write Machine Specific Registers (MSRs). This could be leveraged to execute arbitrary ring-0 code. El controlador de bajo nivel Asusgio en ASUS Aura Sync, en versiones v1.07.22 y anteriores, expone funcionalidades para leer y escribir registros MSR (Machine Specific Registers). Esto podría aprovecharse para ejecutar código ring-0 arbitrario. Multiple vulnerabilities were found in the GLCKIo and Asusgio drivers installed by ASUS Aura Sync, which could allow a local attacker to elevate privileges. • http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html http://seclists.org/fulldisclosure/2018/Dec/34 http://www.securityfocus.com/bid/106250 https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 3

The GLCKIo low-level driver in ASUS Aura Sync v1.07.22 and earlier exposes a path to write an arbitrary DWORD to an arbitrary address. El controlador de bajo nivel GLCKIo en ASUS Aura Sync, en versiones v1.07.22 y anteriores, expone una ruta para escribir un DWORD arbitrario en una dirección arbitraria. Multiple vulnerabilities were found in the GLCKIo and Asusgio drivers installed by ASUS Aura Sync, which could allow a local attacker to elevate privileges. ASUS Aura Sync versions 1.07.22 and below are affected. • http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html http://seclists.org/fulldisclosure/2018/Dec/34 http://www.securityfocus.com/bid/106250 https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 3

The GLCKIo and Asusgio low-level drivers in ASUS Aura Sync v1.07.22 and earlier expose functionality to read/write data from/to IO ports. This could be leveraged in a number of ways to ultimately run code with elevated privileges. Los controladores de bajo nivel GLCKIo y Asusgio en ASUS Aura Sync, en versiones v1.07.22 y anteriores, exponen funcionalidades para leer y escribir datos desde/hacia los puertos IO. Esto podría aprovecharse de varias formas para ejecutar código con privilegios elevados. Multiple vulnerabilities were found in the GLCKIo and Asusgio drivers installed by ASUS Aura Sync, which could allow a local attacker to elevate privileges. • http://packetstormsecurity.com/files/150893/ASUS-Driver-Privilege-Escalation.html http://seclists.org/fulldisclosure/2018/Dec/34 http://www.securityfocus.com/bid/106250 https://www.secureauth.com/labs/advisories/asus-drivers-elevation-privilege-vulnerabilities •