2020-11-02 21:04:24 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2020-28055" ,
"ASSIGNER" : "cve@mitre.org" ,
2020-11-10 18:01:49 +00:00
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://twitter.com/sickcodes/" ,
"url" : "https://twitter.com/sickcodes/"
} ,
{
"refsource" : "MISC" ,
"name" : "https://twitter.com/johnjhacking/" ,
"url" : "https://twitter.com/johnjhacking/"
} ,
{
"refsource" : "MISC" ,
"name" : "https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/" ,
"url" : "https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/"
} ,
{
"refsource" : "MISC" ,
"name" : "https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-012.md" ,
"url" : "https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-012.md"
} ,
{
"refsource" : "MISC" ,
"name" : "https://sick.codes/sick-2020-012" ,
"url" : "https://sick.codes/sick-2020-012"
2020-12-07 16:01:41 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_Press-Statement-and-Questions_11162020.pdf" ,
"url" : "https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_Press-Statement-and-Questions_11162020.pdf"
} ,
{
"refsource" : "MISC" ,
"name" : "https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_GlobalFAQ.pdf" ,
"url" : "https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_GlobalFAQ.pdf"
} ,
{
"refsource" : "MISC" ,
"name" : "https://securityledger.com/2020/11/security-holes-opened-back-door-to-tcl-android-smart-tvs/" ,
"url" : "https://securityledger.com/2020/11/security-holes-opened-back-door-to-tcl-android-smart-tvs/"
} ,
{
"refsource" : "MISC" ,
"name" : "https://securityledger.com/2020/11/tv-maker-tcl-denies-back-door-promises-better-process/" ,
"url" : "https://securityledger.com/2020/11/tv-maker-tcl-denies-back-door-promises-better-process/"
} ,
{
"refsource" : "MISC" ,
"name" : "https://support.tcl.com/vulnerabilities-found-in-tcl-android-tvs" ,
"url" : "https://support.tcl.com/vulnerabilities-found-in-tcl-android-tvs"
2020-11-10 18:01:49 +00:00
}
]
2020-11-02 21:04:24 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-11-10 18:01:49 +00:00
"value" : "A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder."
2020-11-02 21:04:24 +00:00
}
]
}
}