Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-16241

Опубликовано: 26 нояб. 2019
Источник: nvd
CVSS3: 6.8
CVSS2: 4.6
EPSS Низкий

Описание

On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, PIN authentication can be bypassed by creating a special file within the /data/local/tmp/ directory. The System application that implements the lock screen checks for the existence of a specific file and disables PIN authentication if it exists. This file would typically be created via Android Debug Bridge (adb) over USB.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:alcatelmobile:cingular_flip_2_firmware:b9huah1:*:*:*:*:*:*:*
cpe:2.3:h:alcatelmobile:cingularl_flip_2:-:*:*:*:*:*:*:*

EPSS

Процентиль: 18%
0.00059
Низкий

6.8 Medium

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-668

Связанные уязвимости

github
больше 3 лет назад

On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, PIN authentication can be bypassed by creating a special file within the /data/local/tmp/ directory. The System application that implements the lock screen checks for the existence of a specific file and disables PIN authentication if it exists. This file would typically be created via Android Debug Bridge (adb) over USB.

EPSS

Процентиль: 18%
0.00059
Низкий

6.8 Medium

CVSS3

4.6 Medium

CVSS2

Дефекты

CWE-668