CVE-2018-14992
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The ASUS ZenFone 3 Max Android device with a build fingerprint of asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contains a pre-installed platform app with a package name of com.asus.dm (versionCode=1510500200, versionName=1.5.0.40_171122) has an exposed interface in an exported service named com.asus.dm.installer.DMInstallerService that allows any app co-located on the device to use its capabilities to download an arbitrary app over the internet and install it. Any app on the device can send an intent with specific embedded data that will cause the com.asus.dm app to programmatically download and install the app. For the app to be downloaded and installed, certain data needs to be provided: download URL, package name, version name from the app's AndroidManifest.xml file, and the MD5 hash of the app. Moreover, any app that is installed using this method can also be programmatically uninstalled using the same unprotected component named com.asus.dm.installer.DMInstallerService.
El dispositivo Android ASUS ZenFone 3 Max con una huella digital de asus/US_Phone/ASUS_X008_1:7.0/NRD90M/US_Phone-14.14.1711.92-20171208:user/release-keys contiene una app de plataforma preinstalada de nombre com.asus.dm (versionCode=1510500200, versionName=1.5.0.40_171122) que tiene una interfaz expuesta en un servicio exportado llamado com.asus.dm.installer.DMInstallerService que permite que cualquier app ubicada en el dispositivo emplee sus capacidades para descargar una app arbitraria por Internet y la instale. Cualquier app del dispositivo puede enviar un intent con datos específicamente embebidos que provocará que la app com.asus.dm descargue e instale programáticamente la app. Para que la app sea descargada e instalada, deben proporcionarse ciertos datos: URL de descarga, nombre del paquete, nombre de la versión del archivo AndroidManifest.xml de la app y el hash MD5 de la app. Además, cualquier app instalada mediante este método también puede desinstalarse programáticamente mediante el mismo componente sin proteger llamado com.asus.dm.installer.DMInstallerService.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-08-05 CVE Reserved
- 2018-12-28 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (2)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf | 2024-08-05 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.kryptowire.com/portal/android-firmware-defcon-2018 | 2020-08-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Asus Search vendor "Asus" | Zenfone 3 Max Firmware Search vendor "Asus" for product "Zenfone 3 Max Firmware" | 1.5.0.40 Search vendor "Asus" for product "Zenfone 3 Max Firmware" and version "1.5.0.40" | - |
Affected
| in | Asus Search vendor "Asus" | Zenfone 3 Max Search vendor "Asus" for product "Zenfone 3 Max" | - | - |
Safe
|