Today > | 5 Medium | 2 Low vulnerabilities   -   You can now download lists of IOCs here!

CVE-2023-38294

April 22, 2024, 7:24 p.m.

Tags

Product(s) Impacted

Itel Vision 3 Turbo Android device

  • Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105
  • Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118
  • Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101
  • Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803
  • Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721
  • Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712
  • Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613

Itel Vision 3 Turbo Android device

  • F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105 (and previous builds)
  • F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118
  • F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101
  • F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803
  • F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721
  • F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712
  • F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613

Description

Certain software builds for the Itel Vision 3 Turbo Android device contain a vulnerable pre-installed app with a package name of com.transsion.autotest.factory (versionCode='7', versionName='1.8.0(220310_1027)') that allows local third-party apps to execute arbitrary shell commands in its context (system user) due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.transsion.autotest.factory app. No user interaction is required beyond installing and running a third-party app. The vulnerability allows local apps to access sensitive functionality that is generally restricted to pre-installed apps, such as programmatically performing the following actions: granting arbitrary permissions (which can be used to obtain sensitive user data), installing arbitrary apps, video recording the screen, wiping the device (removing the user's apps and data), injecting arbitrary input events, calling emergency phone numbers, disabling apps, accessing notifications, and much more. The confirmed vulnerable software build fingerprints for the Itel Vision 3 Turbo device are as follows: Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712:user/release-keys, and Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613:user/release-keys. This malicious app sends a broadcast Intent to the receiver component named com.transsion.autotest.factory/.broadcast.CommandReceiver with the path to a shell script that it creates in its scoped storage directory. Then the com.transsion.autotest.factory app will execute the shell script with "system" privileges.

Weaknesses

Date

Published: April 22, 2024, 3:15 p.m.

Last Modified: April 22, 2024, 7:24 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

cve@mitre.org

References