Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-6597

Опубликовано: 29 авг. 2018
Источник: nvd
CVSS3: 6.8
CVSS2: 7.2
EPSS Низкий

Описание

The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:alcatel:a30_firmware:7.0:*:*:*:*:*:*:*
cpe:2.3:h:alcatel:a30:-:*:*:*:*:*:*:*

EPSS

Процентиль: 21%
0.00067
Низкий

6.8 Medium

CVSS3

7.2 High

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 6.8
github
больше 3 лет назад

The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).

EPSS

Процентиль: 21%
0.00067
Низкий

6.8 Medium

CVSS3

7.2 High

CVSS2

Дефекты

NVD-CWE-noinfo