CVE-2023-38294
April 22, 2024, 7:24 p.m.
Tags
Product(s) Impacted
Itel Vision 3 Turbo Android device
- Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105
- Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118
- Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101
- Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803
- Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721
- Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712
- Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613
Itel Vision 3 Turbo Android device
- F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105 (and previous builds)
- F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118
- F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101
- F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803
- F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721
- F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712
- F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613
Description
Certain software builds for the Itel Vision 3 Turbo Android device contain a vulnerable pre-installed app with a package name of com.transsion.autotest.factory (versionCode='7', versionName='1.8.0(220310_1027)') that allows local third-party apps to execute arbitrary shell commands in its context (system user) due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.transsion.autotest.factory app. No user interaction is required beyond installing and running a third-party app. The vulnerability allows local apps to access sensitive functionality that is generally restricted to pre-installed apps, such as programmatically performing the following actions: granting arbitrary permissions (which can be used to obtain sensitive user data), installing arbitrary apps, video recording the screen, wiping the device (removing the user's apps and data), injecting arbitrary input events, calling emergency phone numbers, disabling apps, accessing notifications, and much more. The confirmed vulnerable software build fingerprints for the Itel Vision 3 Turbo device are as follows: Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712:user/release-keys, and Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613:user/release-keys. This malicious app sends a broadcast Intent to the receiver component named com.transsion.autotest.factory/.broadcast.CommandReceiver with the path to a shell script that it creates in its scoped storage directory. Then the com.transsion.autotest.factory app will execute the shell script with "system" privileges.
Weaknesses
Date
Published: April 22, 2024, 3:15 p.m.
Last Modified: April 22, 2024, 7:24 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
cve@mitre.org