// For flags

CVE-2023-38295

 

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Certain software builds for the TCL 30Z and TCL 10 Android devices contain a vulnerable, pre-installed app that relies on a missing permission that provides no protection at runtime. The missing permission is required as an access permission by components in various pre-installed apps. On the TCL 30Z device, the vulnerable app has a package name of com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T' ; versionCode='1221092805', versionName='v5.2120.02.12008.2.T'). On the TCL 10L device, the vulnerable app has a package name of com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). When a third-party app declares and requests the missing permission, it can interact with certain service components in the aforementioned apps (that execute with "system" privileges) to perform arbitrary files reads/writes in its context. An app exploiting this vulnerability only needs to declare and request the single missing permission and no user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). This malicious app declares the missing permission named com.tct.smart.switchphone.permission.SWITCH_DATA as a normal permission, requests the missing permission, and uses it to interact with the com.tct.smart.switchdata.DataService service component that is declared in vulnerable apps that execute with "system" privileges to perform arbitrary file reads/writes.

Ciertas versiones de software para los dispositivos Android TCL 30Z y TCL 10 contienen una aplicación vulnerable preinstalada que depende de un permiso faltante que no proporciona protección en tiempo de ejecución. El permiso que falta es necesario como permiso de acceso para los componentes de varias aplicaciones preinstaladas. En el dispositivo TCL 30Z, la aplicación vulnerable tiene un nombre de paquete de com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T'; versionCode='1221092805', versionName='v5.2120.02 .12008.2.T'). En el dispositivo TCL 10L, la aplicación vulnerable tiene un nombre de paquete de com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). Cuando una aplicación de terceros declara y solicita el permiso faltante, puede interactuar con ciertos componentes de servicio en las aplicaciones antes mencionadas (que se ejecutan con privilegios de "sistema") para realizar lecturas/escrituras de archivos arbitrarios en su contexto. Una aplicación que aproveche esta vulnerabilidad solo necesita declarar y solicitar el único permiso que falta y no se requiere ninguna interacción del usuario más allá de instalar y ejecutar una aplicación de terceros. Las huellas digitales de compilación de software para cada dispositivo vulnerable confirmado son las siguientes: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). Esta aplicación maliciosa declara el permiso faltante denominado com.tct.smart.switchphone.permission.SWITCH_DATA como un permiso normal, solicita el permiso faltante y lo utiliza para interactuar con el componente de servicio com.tct.smart.switchdata.DataService que está declarado. en aplicaciones vulnerables que se ejecutan con privilegios de "sistema" para realizar lecturas/escrituras de archivos arbitrarios.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2023-07-14 CVE Reserved
  • 2024-04-22 CVE Published
  • 2024-08-02 CVE Updated
  • 2025-05-31 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-276: Incorrect Default Permissions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tcl
Search vendor "Tcl"
10l Firmware
Search vendor "Tcl" for product "10l Firmware"
*-
Affected
Tcl
Search vendor "Tcl"
30z Firmware
Search vendor "Tcl" for product "30z Firmware"
*-
Affected