// For flags

CVE-2020-27403

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows an attacker on the adjacent network to arbitrarily browse and download sensitive files over an insecure web server running on port 7989 that lists all files & directories. An unprivileged remote attacker on the adjacent network, can download most system files, leading to serious critical information disclosure. Also, some TV models and/or FW versions may expose the webserver with the entire filesystem accessible on another port. For example, nmap scan for all ports run directly from the TV model U43P6046 (Android 8.0) showed port 7983 not mentioned in the original CVE description, but containing the same directory listing of the entire filesystem. This webserver is bound (at least) to localhost interface and accessible freely to all unprivileged installed apps on the Android such as a regular web browser. Any app can therefore read any files of any other apps including Android system settings including sensitive data such as saved passwords, private keys etc.

Una vulnerabilidad en la serie TCL Android Smart TV V8-R851T02-LF1 versiones V295 y por debajo y V8-T658T01-LF1 versiones V373 y por debajo de TCL Technology Group Corporation, permite a un atacante en la red adyacente navegar y descargar arbitrariamente archivos confidenciales a través de un servidor web no seguro ejecutándose en el puerto 7989 que enumera todos los archivos y directorios. Un atacante remoto no privilegiado en la red adyacente puede descargar la mayoría de los archivos del sistema, conllevando a una divulgación de información crítica seria. Además, algunos modelos de televisión y/o versiones FW pueden exponer el servidor web con todo el sistema de archivos accesible en otro puerto. Por ejemplo, la exploración de nmap para todos los puertos ejecutados directamente desde el modelo de TV U43P6046 (Android 8.0) mostró el puerto 7983 no mencionado en la descripción original de CVE, pero que contenía el mismo listado de directorios de todo el sistema de archivos. Este servidor web está vinculado (al menos) a la interfaz del host local y es accesible libremente a todas las aplicaciones instaladas sin privilegios en el Android, como un navegador web normal. Por lo tanto, cualquier aplicación puede leer cualquier archivo de cualquier otra aplicación, incluyendo la configuración del sistema Android, incluyendo datos sensibles como contraseñas guardadas, claves privadas, etc.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-10-21 CVE Reserved
  • 2020-11-10 CVE Published
  • 2023-07-27 EPSS Updated
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tcl
Search vendor "Tcl"
32s330 Firmware
Search vendor "Tcl" for product "32s330 Firmware"
< v8-r851t10-lf1v091
Search vendor "Tcl" for product "32s330 Firmware" and version " < v8-r851t10-lf1v091"
-
Affected
in Tcl
Search vendor "Tcl"
32s330
Search vendor "Tcl" for product "32s330"
--
Safe
Tcl
Search vendor "Tcl"
40s330 Firmware
Search vendor "Tcl" for product "40s330 Firmware"
< v8-r851t10-lf1v091
Search vendor "Tcl" for product "40s330 Firmware" and version " < v8-r851t10-lf1v091"
-
Affected
in Tcl
Search vendor "Tcl"
40s330
Search vendor "Tcl" for product "40s330"
--
Safe
Tcl
Search vendor "Tcl"
43s434 Firmware
Search vendor "Tcl" for product "43s434 Firmware"
< v8-r851t02-lf1v440
Search vendor "Tcl" for product "43s434 Firmware" and version " < v8-r851t02-lf1v440"
-
Affected
in Tcl
Search vendor "Tcl"
43s434
Search vendor "Tcl" for product "43s434"
--
Safe
Tcl
Search vendor "Tcl"
50s434 Firmware
Search vendor "Tcl" for product "50s434 Firmware"
< v8-r851t02-lf1v440
Search vendor "Tcl" for product "50s434 Firmware" and version " < v8-r851t02-lf1v440"
-
Affected
in Tcl
Search vendor "Tcl"
50s434
Search vendor "Tcl" for product "50s434"
--
Safe
Tcl
Search vendor "Tcl"
55s434 Firmware
Search vendor "Tcl" for product "55s434 Firmware"
< v8-r851t02-lf1v440
Search vendor "Tcl" for product "55s434 Firmware" and version " < v8-r851t02-lf1v440"
-
Affected
in Tcl
Search vendor "Tcl"
55s434
Search vendor "Tcl" for product "55s434"
--
Safe
Tcl
Search vendor "Tcl"
65s434 Firmware
Search vendor "Tcl" for product "65s434 Firmware"
< v8-r851t02-lf1v440
Search vendor "Tcl" for product "65s434 Firmware" and version " < v8-r851t02-lf1v440"
-
Affected
in Tcl
Search vendor "Tcl"
65s434
Search vendor "Tcl" for product "65s434"
--
Safe
Tcl
Search vendor "Tcl"
75s434 Firmware
Search vendor "Tcl" for product "75s434 Firmware"
< v8-r851t02-lf1v440
Search vendor "Tcl" for product "75s434 Firmware" and version " < v8-r851t02-lf1v440"
-
Affected
in Tcl
Search vendor "Tcl"
75s434
Search vendor "Tcl" for product "75s434"
--
Safe