// For flags

CVE-2019-15743

 

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The Sony Xperia Touch Android device with a build fingerprint of Sony/blanc_windy/blanc_windy:7.0/LOIRE-SMART-BLANC-1.0.0-170530-0834/1:user/dev-keys contains a pre-installed app with a package name of com.sonymobile.android.maintenancetool.testmic app (versionCode=24, versionName=7.0) that allows unauthorized microphone audio recording via a confused deputy attack. This capability can be accessed by any app co-located on the device. This app allows a third-party app to use its open interface to record audio to external storage.

El dispositivo Sony Xperia Touch Android con una huella digital de compilación de Sony/blanc_windy/blanc_windy:7.0/LOIRE-SMART-BLANC-1.0.0-170530-0834/1:user/dev-keys, contiene una aplicación preinstalada con un nombre de paquete de aplicación com.sonymobile.android.maintenancetool.testmic (versionCode=24, versionName=7.0), que permite la grabación de audio de micrófono no autorizado por medio de un ataque de tipo confused deputy. Esta capacidad puede ser accedida mediante cualquier aplicación ubicada en el dispositivo. Esta aplicación permite a una aplicación de terceros utilizar su interfaz abierta para grabar audio en almacenamiento externo.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-08-28 CVE Reserved
  • 2019-11-14 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-610: Externally Controlled Reference to a Resource in Another Sphere
CAPEC
References (1)
URL Tag Source
https://www.kryptowire.com/android-firmware-2019 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Sony
Search vendor "Sony"
Xperia Touch Firmware
Search vendor "Sony" for product "Xperia Touch Firmware"
--
Affected
in Sony
Search vendor "Sony"
Xperia Touch
Search vendor "Sony" for product "Xperia Touch"
--
Safe