CVE-2023-38293

Certain software builds for the Nokia C200 and Nokia C100 Android devices contain a vulnerable, pre-installed app with a package name of com.tracfone.tfstatus (versionCode='31', versionName='12') that allows local third-party apps to execute arbitrary AT commands in its context (radio user) via AT command injection due to inadequate access control and inadequate input filtering. No permissions or special privileges are necessary to exploit the vulnerability in the com.tracfone.tfstatus app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys and Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_040:user/release-keys) and Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_130:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_110:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_080:user/release-keys, and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_050:user/release-keys). This malicious app sends a broadcast Intent to the receiver component named com.tracfone.tfstatus/.TFStatus. This broadcast receiver extracts a string from the Intent and uses it as an extra when it starts the com.tracfone.tfstatus/.TFStatusActivity activity component which uses the externally controlled string as an input to execute an AT command. There are two different injection techniques to successfully inject arbitrary AT commands to execute.
Configurations

No configuration.

History

21 Nov 2024, 08:13

Type Values Removed Values Added
References () https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf - () https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf -

03 Jul 2024, 01:40

Type Values Removed Values Added
CWE CWE-20
Summary
  • (es) Ciertas versiones de software para los dispositivos Android Nokia C200 y Nokia C100 contienen una aplicación vulnerable preinstalada con un nombre de paquete de com.tracfone.tfstatus (versionCode='31', versionName='12') que permite aplicaciones locales de terceros. ejecutar comandos AT arbitrarios en su contexto (usuario de radio) mediante la inyección de comandos AT debido a un control de acceso inadecuado y un filtrado de entrada inadecuado. No se necesitan permisos ni privilegios especiales para explotar la vulnerabilidad en la aplicación com.tracfone.tfstatus. No se requiere ninguna interacción del usuario más allá de instalar y ejecutar una aplicación de terceros. Las huellas digitales de compilación de software para cada dispositivo vulnerable confirmado son las siguientes: Nokia C200 (Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_080:user/release-keys and Nokia/Drake_02US/DRK:12/SP1A.210812.016/02US_1_040:user/release-keys) and Nokia C100 (Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_270:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_190:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_130:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_110:user/release-keys, Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_080:user/release-keys, and Nokia/DrakeLite_02US/DKT:12/SP1A.210812.016/02US_1_050:user/release-keys). Esta aplicación maliciosa envía una intención de transmisión al componente receptor llamado com.tracfone.tfstatus/.TFStatus. Este receptor de transmisión extrae una cadena del Intent y la usa como extra cuando inicia el componente de actividad com.tracfone.tfstatus/.TFStatusActivity que usa la cadena controlada externamente como entrada para ejecutar un comando AT. Existen dos técnicas de inyección diferentes para inyectar con éxito comandos AT arbitrarios para ejecutar.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3

22 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-22 15:15

Updated : 2024-11-21 08:13


NVD link : CVE-2023-38293

Mitre link : CVE-2023-38293

CVE.ORG link : CVE-2023-38293


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation