CVE-2023-38294

Certain software builds for the Itel Vision 3 Turbo Android device contain a vulnerable pre-installed app with a package name of com.transsion.autotest.factory (versionCode='7', versionName='1.8.0(220310_1027)') that allows local third-party apps to execute arbitrary shell commands in its context (system user) due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.transsion.autotest.factory app. No user interaction is required beyond installing and running a third-party app. The vulnerability allows local apps to access sensitive functionality that is generally restricted to pre-installed apps, such as programmatically performing the following actions: granting arbitrary permissions (which can be used to obtain sensitive user data), installing arbitrary apps, video recording the screen, wiping the device (removing the user's apps and data), injecting arbitrary input events, calling emergency phone numbers, disabling apps, accessing notifications, and much more. The confirmed vulnerable software build fingerprints for the Itel Vision 3 Turbo device are as follows: Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712:user/release-keys, and Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613:user/release-keys. This malicious app sends a broadcast Intent to the receiver component named com.transsion.autotest.factory/.broadcast.CommandReceiver with the path to a shell script that it creates in its scoped storage directory. Then the com.transsion.autotest.factory app will execute the shell script with "system" privileges.
Configurations

No configuration.

History

04 Dec 2024, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CWE CWE-276

21 Nov 2024, 08:13

Type Values Removed Values Added
Summary
  • (es) Ciertas versiones de software para el dispositivo Android Itel Vision 3 Turbo contienen una aplicación preinstalada vulnerable con un nombre de paquete com.transsion.autotest.factory (versionCode='7', versionName='1.8.0(220310_1027)') que permite aplicaciones locales de terceros para ejecutar comandos de shell arbitrarios en su contexto (usuario del sistema) debido a un control de acceso inadecuado. No se necesitan permisos ni privilegios especiales para explotar la vulnerabilidad en la aplicación com.transsion.autotest.factory. No se requiere ninguna interacción del usuario más allá de instalar y ejecutar una aplicación de terceros. La vulnerabilidad permite que las aplicaciones locales accedan a funciones confidenciales que generalmente están restringidas a aplicaciones preinstaladas, como realizar mediante programación las siguientes acciones: otorgar permisos arbitrarios (que pueden usarse para obtener datos confidenciales del usuario), instalar aplicaciones arbitrarias, grabar videos de la pantalla. , borrar el dispositivo (eliminar las aplicaciones y los datos del usuario), inyectar eventos de entrada arbitrarios, llamar a números de teléfono de emergencia, deshabilitar aplicaciones, acceder a notificaciones y mucho más. Las huellas digitales de compilación de software vulnerable confirmadas para el dispositivo Itel Vision 3 Turbo son las siguientes: Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V92-20230105:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V86-20221118:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V78-20221101:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V64-20220803:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V61-20220721:user/release-keys, Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V58-20220712:user/release-keys, and Itel/F6321/itel-S661LP:11/RP1A.201005.001/GL-V051-20220613:user/release-keys. Esta aplicación maliciosa envía una intención de transmisión al componente receptor llamado com.transsion.autotest.factory/.broadcast.CommandReceiver con la ruta a un script de shell que crea en su directorio de almacenamiento de alcance. Luego, la aplicación com.transsion.autotest.factory ejecutará el script de shell con privilegios de "sistema".
References () https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf - () https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf -
References () https://security.tecno.com/SRC/blogdetail/99?lang=en_US - () https://security.tecno.com/SRC/blogdetail/99?lang=en_US -

22 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-22 15:15

Updated : 2024-12-04 17:15


NVD link : CVE-2023-38294

Mitre link : CVE-2023-38294

CVE.ORG link : CVE-2023-38294


JSON object : View

Products Affected

No product.

CWE
CWE-276

Incorrect Default Permissions