René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

351 lines
12 KiB
JSON

{
"id": "CVE-2020-27403",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-11-10T18:15:12.043",
"lastModified": "2021-07-21T11:39:23.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows an attacker on the adjacent network to arbitrarily browse and download sensitive files over an insecure web server running on port 7989 that lists all files & directories. An unprivileged remote attacker on the adjacent network, can download most system files, leading to serious critical information disclosure. Also, some TV models and/or FW versions may expose the webserver with the entire filesystem accessible on another port. For example, nmap scan for all ports run directly from the TV model U43P6046 (Android 8.0) showed port 7983 not mentioned in the original CVE description, but containing the same directory listing of the entire filesystem. This webserver is bound (at least) to localhost interface and accessible freely to all unprivileged installed apps on the Android such as a regular web browser. Any app can therefore read any files of any other apps including Android system settings including sensitive data such as saved passwords, private keys etc."
},
{
"lang": "es",
"value": "Una vulnerabilidad en la serie TCL Android Smart TV V8-R851T02-LF1 versiones V295 y por debajo y V8-T658T01-LF1 versiones V373 y por debajo de TCL Technology Group Corporation, permite a un atacante en la red adyacente navegar y descargar arbitrariamente archivos confidenciales a trav\u00e9s de un servidor web no seguro ejecut\u00e1ndose en el puerto 7989 que enumera todos los archivos y directorios. Un atacante remoto no privilegiado en la red adyacente puede descargar la mayor\u00eda de los archivos del sistema, conllevando a una divulgaci\u00f3n de informaci\u00f3n cr\u00edtica seria. Adem\u00e1s, algunos modelos de televisi\u00f3n y/o versiones FW pueden exponer el servidor web con todo el sistema de archivos accesible en otro puerto. Por ejemplo, la exploraci\u00f3n de nmap para todos los puertos ejecutados directamente desde el modelo de TV U43P6046 (Android 8.0) mostr\u00f3 el puerto 7983 no mencionado en la descripci\u00f3n original de CVE, pero que conten\u00eda el mismo listado de directorios de todo el sistema de archivos. Este servidor web est\u00e1 vinculado (al menos) a la interfaz del host local y es accesible libremente a todas las aplicaciones instaladas sin privilegios en el Android, como un navegador web normal. Por lo tanto, cualquier aplicaci\u00f3n puede leer cualquier archivo de cualquier otra aplicaci\u00f3n, incluyendo la configuraci\u00f3n del sistema Android, incluyendo datos sensibles como contrase\u00f1as guardadas, claves privadas, etc."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tcl:32s330_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v8-r851t10-lf1v091",
"matchCriteriaId": "F8917F66-D6DD-4592-B426-2D732B20F9EB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tcl:32s330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56FE475B-9E0B-4CEB-ACE7-12298F24EA44"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tcl:40s330_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v8-r851t10-lf1v091",
"matchCriteriaId": "D80F9316-673A-418B-B235-EB07256BEDC6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tcl:40s330:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E20B7CC-7A75-4881-ACC8-1823C7FA0075"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tcl:43s434_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v8-r851t02-lf1v440",
"matchCriteriaId": "4B3CEA71-8A14-49F8-9DD1-998FFA8D9083"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tcl:43s434:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7EDDFE1-4794-4FEB-9505-08EC4CE2E7DE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tcl:50s434_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v8-r851t02-lf1v440",
"matchCriteriaId": "A35187E7-A0E1-48B4-8528-2D9A0126C950"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tcl:50s434:-:*:*:*:*:*:*:*",
"matchCriteriaId": "369146B4-AA84-4997-8E92-5E651E402317"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tcl:55s434_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v8-r851t02-lf1v440",
"matchCriteriaId": "C5EDE7A1-9426-4C8A-9031-F0F30E6E882E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tcl:55s434:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDD2D6D3-CA5D-48CA-9B31-01225E395858"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tcl:65s434_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v8-r851t02-lf1v440",
"matchCriteriaId": "25A8C850-0968-4DF4-B795-48EADD4DB197"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tcl:65s434:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A807F653-170F-4819-B378-0BF2F841CEC2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tcl:75s434_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "v8-r851t02-lf1v440",
"matchCriteriaId": "757EBB9A-4404-4B07-BAFA-8502BE5942A4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tcl:75s434:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2E147C9-2EEE-468A-96B2-1EAFCEF0D917"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sickcodes",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-009.md",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_GlobalFAQ.pdf",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_Press-Statement-and-Questions_11162020.pdf",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/sickcodes/security/issues/1",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://securityledger.com/2020/11/security-holes-opened-back-door-to-tcl-android-smart-tvs/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://securityledger.com/2020/11/tv-maker-tcl-denies-back-door-promises-better-process/",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://sick.codes/sick-2020-009",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://support.tcl.com/vulnerabilities-found-in-tcl-android-tvs",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}