Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-15027

Опубликовано: 14 авг. 2019
Источник: nvd
CVSS3: 9.8
CVSS2: 10
EPSS Низкий

Описание

The MediaTek Embedded Multimedia Card (eMMC) subsystem for Android on MT65xx, MT66xx, and MT8163 SoC devices allows attackers to execute arbitrary commands as root via shell metacharacters in a filename under /data, because clear_emmc_nomedia_entry in platform/mt6577/external/meta/emmc/meta_clr_emmc.c invokes 'system("/system/bin/rm -r /data/' followed by this filename upon an eMMC clearance from a Meta Mode boot. NOTE: compromise of Fire OS on the Amazon Echo Dot would require a second hypothetical vulnerability that allows creation of the required file under /data.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:mediatek:mt8163_firmware:-:*:*:*:*:android:*:*
cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:android:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:mediatek:mt6625_firmware:-:*:*:*:*:android:*:*
cpe:2.3:h:mediatek:mt6625:-:*:*:*:*:android:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:mediatek:mt6577_firmware:-:*:*:*:*:android:*:*
cpe:2.3:h:mediatek:mt6577:-:*:*:*:*:android:*:*

EPSS

Процентиль: 85%
0.02356
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-78

Связанные уязвимости

github
больше 3 лет назад

The MediaTek Embedded Multimedia Card (eMMC) subsystem for Android on MT65xx, MT66xx, and MT8163 SoC devices allows attackers to execute arbitrary commands as root via shell metacharacters in a filename under /data, because clear_emmc_nomedia_entry in platform/mt6577/external/meta/emmc/meta_clr_emmc.c invokes 'system("/system/bin/rm -r /data/' followed by this filename upon an eMMC clearance from a Meta Mode boot. NOTE: compromise of Fire OS on the Amazon Echo Dot would require a second hypothetical vulnerability that allows creation of the required file under /data.

EPSS

Процентиль: 85%
0.02356
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-78