2024-12-08 03:06:42 +00:00

64 lines
6.2 KiB
JSON

{
"id": "CVE-2023-38295",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T15:15:46.937",
"lastModified": "2024-11-21T08:13:15.217",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain software builds for the TCL 30Z and TCL 10 Android devices contain a vulnerable, pre-installed app that relies on a missing permission that provides no protection at runtime. The missing permission is required as an access permission by components in various pre-installed apps. On the TCL 30Z device, the vulnerable app has a package name of com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T' ; versionCode='1221092805', versionName='v5.2120.02.12008.2.T'). On the TCL 10L device, the vulnerable app has a package name of com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). When a third-party app declares and requests the missing permission, it can interact with certain service components in the aforementioned apps (that execute with \"system\" privileges) to perform arbitrary files reads/writes in its context. An app exploiting this vulnerability only needs to declare and request the single missing permission and no user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). This malicious app declares the missing permission named com.tct.smart.switchphone.permission.SWITCH_DATA as a normal permission, requests the missing permission, and uses it to interact with the com.tct.smart.switchdata.DataService service component that is declared in vulnerable apps that execute with \"system\" privileges to perform arbitrary file reads/writes."
},
{
"lang": "es",
"value": "Ciertas versiones de software para los dispositivos Android TCL 30Z y TCL 10 contienen una aplicaci\u00f3n vulnerable preinstalada que depende de un permiso faltante que no proporciona protecci\u00f3n en tiempo de ejecuci\u00f3n. El permiso que falta es necesario como permiso de acceso para los componentes de varias aplicaciones preinstaladas. En el dispositivo TCL 30Z, la aplicaci\u00f3n vulnerable tiene un nombre de paquete de com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T'; versionCode='1221092805', versionName='v5.2120.02 .12008.2.T'). En el dispositivo TCL 10L, la aplicaci\u00f3n vulnerable tiene un nombre de paquete de com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). Cuando una aplicaci\u00f3n de terceros declara y solicita el permiso faltante, puede interactuar con ciertos componentes de servicio en las aplicaciones antes mencionadas (que se ejecutan con privilegios de \"sistema\") para realizar lecturas/escrituras de archivos arbitrarios en su contexto. Una aplicaci\u00f3n que aproveche esta vulnerabilidad solo necesita declarar y solicitar el \u00fanico permiso que falta y no se requiere ninguna interacci\u00f3n del usuario m\u00e1s all\u00e1 de instalar y ejecutar una aplicaci\u00f3n de terceros. Las huellas digitales de compilaci\u00f3n de software para cada dispositivo vulnerable confirmado son las siguientes: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). Esta aplicaci\u00f3n maliciosa declara el permiso faltante denominado com.tct.smart.switchphone.permission.SWITCH_DATA como un permiso normal, solicita el permiso faltante y lo utiliza para interactuar con el componente de servicio com.tct.smart.switchdata.DataService que est\u00e1 declarado. en aplicaciones vulnerables que se ejecutan con privilegios de \"sistema\" para realizar lecturas/escrituras de archivos arbitrarios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}