// For flags

CVE-2018-14979

 

Severity Score

4.7
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The ASUS ZenFone 3 Max Android device with a build fingerprint of asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contains a pre-installed app with a package name of com.asus.loguploader (versionCode=1570000275, versionName=7.0.0.55_170515). This app contains an exported service app component named com.asus.loguploader.LogUploaderService that, when accessed with a particular action string, will write a bugreport (kernel log, logcat log, and the state of system services including the text of active notifications), Wi-Fi Passwords, and other system data to external storage (sdcard). Any app with the READ_EXTERNAL_STORAGE permission on this device can read this data from the sdcard after it has been dumped there by the com.asus.loguploader. Third-party apps are not allowed to directly create a bugreport or access the user's stored wireless network credentials.

El dispositivo Android ASUS ZenFone 3 Max con una huella digital asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contiene una aplicación preinstalada, cuyo paquete se denomina com.asus.loguploader (versionCode=1570000275, versionName=7.0.0.55_170515). Esta app contiene un componente de app de servicio exportada llamado com.asus.loguploader.LogUploaderService que, al accederse a él con una cadena de acción determinada, escribirá un informe de errores (registro del kernel, registro logcat y el estado de los servicios del sistema, incluyendo el texto de las notificaciones activas), las contraseñas de wifi y otros datos del sistema en el almacenamiento externo (tarjeta SD). Cualquier app con el permiso READ_EXTERNAL_STORAGE en este dispositivo puede leer estos datos desde la tarjeta SD una vez han sido volcados ahí por com.asus.loguploader. Las aplicaciones de terceros no pueden crear directamente un informe de errores o acceder a las credenciales de red inalámbrica almacenadas del usuario.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-08-05 CVE Reserved
  • 2018-12-28 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Asus
Search vendor "Asus"
Zenfone 3 Max Firmware
Search vendor "Asus" for product "Zenfone 3 Max Firmware"
7.0.0.55
Search vendor "Asus" for product "Zenfone 3 Max Firmware" and version "7.0.0.55"
-
Affected
in Asus
Search vendor "Asus"
Zenfone 3 Max
Search vendor "Asus" for product "Zenfone 3 Max"
--
Safe