// For flags

CVE-2016-10135

 

Severity Score

5.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An issue was discovered on LG devices using the MTK chipset with L(5.0/5.1), M(6.0/6.0.1), and N(7.0) software, and RCA Voyager Tablet, BLU Advance 5.0, and BLU R1 HD devices. The MTKLogger app with a package name of com.mediatek.mtklogger has application components that are accessible to any application that resides on the device. Namely, the com.mediatek.mtklogger.framework.LogReceiver and com.mediatek.mtklogger.framework.MTKLoggerService application components are exported since they contain an intent filter, are not protected by a custom permission, and do not explicitly set the android:exported attribute to false. Therefore, these components are exported by default and are thus accessible to any third party application by using android.content.Intent object for communication. These application components can be used to start and stop the logs using Intent objects with embedded data. The available logs are the GPS log, modem log, network log, and mobile log. The base directory that contains the directories for the 4 types of logs is /sdcard/mtklog which makes them accessible to apps that require the READ_EXTERNAL_STORAGE permission. The GPS log contains the GPS coordinates of the user as well as a timestamp for the coordinates. The modem log contains AT commands and their parameters which allow the user's outgoing and incoming calls and text messages to be obtained. The network log is a tcpdump network capture. The mobile log contains the Android log, which is not available to third-party apps as of Android 4.1. The LG ID is LVE-SMP-160019.

Se descubrió un problema en los dispositivos LG que utilizan el chipset MTK con software L(5.0/5.1), M(6.0/6.0.1) y N(7.0) y dispositivos RCA Voyager Tablet, BLU Advance 5.0 y BLU R1 HD. La aplicación MTKLogger con un nombre de paquete de com.mediatek.mtklogger tiene componentes de aplicación que son accesibles para cualquier aplicación que resida en el dispositivo. Es decir, los componentes de la aplicación com.mediatek.mtklogger.framework.LogReceiver y com.mediatek.mtklogger.framework.MTKLoggerService se exportan ya que contienen un filtro de intenciones, no están protegidos por un permiso personalizado y no establecen explicitamente Android: exportado a false. Por lo tanto, estos componentes se exportan de forma predeterminada y, por lo tanto, son accesibles a cualquier aplicación de terceros utilizando el objeto android.content.Intent para la comunicación. Estos componentes de aplicación se pueden utilizar para iniciar y detener los registros mediante objetos Intent con datos incrustados. Los registros disponibles son el el registro GPS, el registro del módem, el registro de la red y el registro móvil. El directorio base que contiene los directorios para los 4 tipos de registros is /sdcard/mtklog que los hace accesibles a las aplicaciones que requieren el permiso READ_EXTERNAL_STORAGE. El registro GPS del usuario, así como una marca de tiempo para las coordenadas. El registro de módem contienen comando AT y sus parámetro que permiten obtener las llamadas entrantes y salientes del usuario y los mensajes de texto. El registro para teléfonos móviles contiene el registro de Android, que no está disponible para aplicaciones de terceros desde Android 4.1. El LG ID is LVE-SMP-160019.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-01-13 CVE Reserved
  • 2017-01-13 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Lg
Search vendor "Lg"
Lg Mobile
Search vendor "Lg" for product "Lg Mobile"
5.0
Search vendor "Lg" for product "Lg Mobile" and version "5.0"
-
Affected
Lg
Search vendor "Lg"
Lg Mobile
Search vendor "Lg" for product "Lg Mobile"
5.1
Search vendor "Lg" for product "Lg Mobile" and version "5.1"
-
Affected
Lg
Search vendor "Lg"
Lg Mobile
Search vendor "Lg" for product "Lg Mobile"
6.0
Search vendor "Lg" for product "Lg Mobile" and version "6.0"
-
Affected
Lg
Search vendor "Lg"
Lg Mobile
Search vendor "Lg" for product "Lg Mobile"
6.0.1
Search vendor "Lg" for product "Lg Mobile" and version "6.0.1"
-
Affected
Lg
Search vendor "Lg"
Lg Mobile
Search vendor "Lg" for product "Lg Mobile"
7.0
Search vendor "Lg" for product "Lg Mobile" and version "7.0"
-
Affected