8 results (0.012 seconds)

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

The Coolpad 1851 Android device with a build fingerprint of Coolpad/android/android:8.1.0/O11019/1534834761:userdebug/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.1.13). This app contains an exported service named com.lovelyfont.manager.FontCoverService that allows any app co-located on the device to supply arbitrary commands to be executed as the system user. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. In addition to the local attack surface, its accompanying app with a package name of com.ekesoo.lovelyhifonts makes network requests using HTTP and an attacker can perform a Man-in-the-Middle (MITM) attack on the connection to inject a command in a network response that will be executed as the system user by the com.lovelyfont.defcontainer app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. • https://www.kryptowire.com/android-firmware-2019 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

The Coolpad 1851 Android device with a build fingerprint of Coolpad/android/android:8.1.0/O11019/1534834761:userdebug/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. El dispositivo Coolpad 1851 Android con una huella digital de compilación de Coolpad/android/android:8.1.0/O11019/1534834761:userdebug/release-keys, contiene una aplicación preinstalada con un nombre de paquete de aplicación com.mediatek.wfo.impl (versionCode=27, versionName=8.1.0), que permite a cualquier aplicación ubicada sobre el dispositivo modificar una propiedad del sistema por medio de una interfaz exportada sin la autorización adecuada. • https://www.kryptowire.com/android-firmware-2019 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

The Coolpad N3C Android device with a build fingerprint of Coolpad/N3C/N3C:8.1.0/O11019/1538236809:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. El dispositivo Coolpad N3C Android con una huella digital de compilación de Coolpad/N3C/N3C:8.1.0/O11019/1538236809:user/release-keys, contiene una aplicación preinstalada con un nombre de paquete de aplicación com.mediatek.wfo.impl (versionCode=27, versionName=8.1.0), que permite a cualquier aplicación ubicada en el dispositivo modificar una propiedad del sistema por medio de una interfaz exportada sin la autorización apropiada. • https://www.kryptowire.com/android-firmware-2019 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

The Coolpad 1851 Android device with a build fingerprint of Coolpad/android/android:8.1.0/O11019/1534834761:userdebug/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. El dispositivo Coolpad 1851 Android con una huella digital de compilación de Coolpad/android/android:8.1.0/O11019/1534834761:userdebug/release-keys, contiene una aplicación preinstalada con un nombre de paquete de aplicación com.mediatek.wfo.impl (versionCode=27, versionName=8.1.0), que permite a cualquier aplicación ubicada en el dispositivo modificar una propiedad del sistema por medio de una interfaz exportada sin la autorización apropiada. • https://www.kryptowire.com/android-firmware-2019 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 1

The Coolpad Defiant (Coolpad/cp3632a/cp3632a:7.1.1/NMF26F/099480857:user/release-keys) and the T-Mobile Revvl Plus (Coolpad/alchemy/alchemy:7.1.1/143.14.171129.3701A-TMO/buildf_nj_02-206:user/release-keys) Android devices contain a pre-installed platform app with a package name of com.qualcomm.qti.telephony.extcarrierpack (versionCode=25, versionName=7.1.1) containing an exported broadcast receiver app component named com.qualcomm.qti.telephony.extcarrierpack.UiccReceiver that allows any app co-located on the device to programmatically perform a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app. • https://www.kryptowire.com https://www.kryptowire.com/portal/android-firmware-defcon-2018 https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf • CWE-20: Improper Input Validation •