mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
131 lines
5.5 KiB
JSON
131 lines
5.5 KiB
JSON
{
|
|
"id": "CVE-2018-14994",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2019-04-25T20:29:01.020",
|
|
"lastModified": "2019-05-02T17:50:34.367",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Essential Phone Android device with a build fingerprint of essential/mata/mata:8.1.0/OPM1.180104.166/297:user/release-keys contains a pre-installed platform app with a package name of com.ts.android.hiddenmenu (versionName=1.0, platformBuildVersionName=8.1.0) that contains an exported activity app component named com.ts.android.hiddenmenu.rtn.RTNResetActivity that allows any app co-located on the device to programmatically initiate a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El dispositivo Android de Essential Phone con una huella digital de compilaci\u00f3n essential/mata/mata:8.1.0/OPM1.180104.166/297:user/release-keys alberga una aplicaci\u00f3n de plataforma preinstalada con el nombre del paquete com.ts.android.hiddenmenu (versionName=1.0, platformBuildVersionName=8.1.0) que contiene un componente de aplicaci\u00f3n de actividad exportada denominado com.ts.android.hiddenmenu.rtn.RTNResetActivity que permite que cualquier aplicaci\u00f3n dentro del dispositivo inicie un restablecimiento de f\u00e1brica programadamente. Adicionamete, la aplicaci\u00f3n que inicia el restablecimiento de f\u00e1brica no requiere ning\u00fan permiso. Un restablecimiento de f\u00e1brica suprimir\u00e1 todos los datos de usuario y aplicaciones del dispositivo. Esto conllevar\u00e1 a la p\u00e9rdida de cualquier dato que no haya sido respaldado o sincronizado externamente. La capacidad para ejecutar un restablecimiento de f\u00e1brica no est\u00e1 disponible directamente para aplicaciones de terceros (aquellas que el usuario se instala solo con la excepci\u00f3n de las aplicaciones de Mobile Device Management (MDM) habilitadas), aunque esta capacidad puede ser conseguida al operar un componente de aplicaci\u00f3n no protegido de una aplicaci\u00f3n de plataforma preinstalada."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV30": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.0",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.5,
|
|
"baseSeverity": "HIGH"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 3.6
|
|
}
|
|
],
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.4
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 9.2,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:essential:phone_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "35ED9ABA-C055-420C-83E7-179A32334E83"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:essential:phone:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "57F6A57D-AAB3-4231-9D8A-65FD183B774B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.kryptowire.com",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.kryptowire.com/portal/android-firmware-defcon-2018/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.kryptowire.com/portal/wp-content/uploads/2018/12/DEFCON-26-Johnson-and-Stavrou-Vulnerable-Out-of-the-Box-An-Eval-of-Android-Carrier-Devices-WP-Updated.pdf",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Third Party Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |