On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, there is an undocumented web API that allows unprivileged JavaScript, including JavaScript running within the KaiOS browser, to view and edit the device's firmware over-the-air update settings. (This web API is normally used by the system application to trigger firmware updates via OmaService.js.)
References
Link | Resource |
---|---|
https://www.nccgroup.trust/uk/our-research/?research=Technical+advisories | Third Party Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-alcatel-flip-2/#B | Exploit Third Party Advisory |
https://www.nccgroup.trust/uk/our-research/?research=Technical+advisories | Third Party Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-alcatel-flip-2/#B | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.nccgroup.trust/uk/our-research/?research=Technical+advisories - Third Party Advisory | |
References | () https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabilities-in-alcatel-flip-2/#B - Exploit, Third Party Advisory |
Information
Published : 2019-11-26 16:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16243
Mitre link : CVE-2019-16243
CVE.ORG link : CVE-2019-16243
JSON object : View
Products Affected
alcatelmobile
- cingular_flip_2
- cingular_flip_2_firmware
CWE
CWE-306
Missing Authentication for Critical Function