CVE-2024-39438

Oct. 17, 2024, 5:19 p.m.

6.7
Medium

Description

In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed.

Product(s) Impacted

Vendor Product Versions
Google
  • Android
  • 13.0, 14.0
Unisoc
  • S8000
  • Sc7731e
  • Sc9832e
  • Sc9863a
  • T310
  • T606
  • T610
  • T612
  • T616
  • T618
  • T760
  • T770
  • T820
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

*CPE(s)

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o google android 13.0 / / / / / / /
o google android 14.0 / / / / / / /
h unisoc s8000 - / / / / / / /
h unisoc sc7731e - / / / / / / /
h unisoc sc9832e - / / / / / / /
h unisoc sc9863a - / / / / / / /
h unisoc t310 - / / / / / / /
h unisoc t606 - / / / / / / /
h unisoc t610 - / / / / / / /
h unisoc t612 - / / / / / / /
h unisoc t616 - / / / / / / /
h unisoc t618 - / / / / / / /
h unisoc t760 - / / / / / / /
h unisoc t770 - / / / / / / /
h unisoc t820 - / / / / / / /

CVSS Score

6.7 / 10

CVSS Data

  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Privileges Required: HIGH
  • Scope: UNCHANGED
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • View Vector String

    CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Date

  • Published: Oct. 9, 2024, 7:15 a.m.
  • Last Modified: Oct. 17, 2024, 5:19 p.m.

Status : Analyzed

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

security@unisoc.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.