CVE-2023-38295

Certain software builds for the TCL 30Z and TCL 10 Android devices contain a vulnerable, pre-installed app that relies on a missing permission that provides no protection at runtime. The missing permission is required as an access permission by components in various pre-installed apps. On the TCL 30Z device, the vulnerable app has a package name of com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T' ; versionCode='1221092805', versionName='v5.2120.02.12008.2.T'). On the TCL 10L device, the vulnerable app has a package name of com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). When a third-party app declares and requests the missing permission, it can interact with certain service components in the aforementioned apps (that execute with "system" privileges) to perform arbitrary files reads/writes in its context. An app exploiting this vulnerability only needs to declare and request the single missing permission and no user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable device are as follows: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). This malicious app declares the missing permission named com.tct.smart.switchphone.permission.SWITCH_DATA as a normal permission, requests the missing permission, and uses it to interact with the com.tct.smart.switchdata.DataService service component that is declared in vulnerable apps that execute with "system" privileges to perform arbitrary file reads/writes.
Configurations

No configuration.

History

21 Nov 2024, 08:13

Type Values Removed Values Added
References () https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf - () https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Ryan%20Johnson%20Mohamed%20Elsabagh%20Angelos%20Stavrou%20-%20Still%20Vulnerable%20Out%20of%20the%20Box%20Revisiting%20the%20Security%20of%20Prepaid%20Android%20Carrier%20Devices.pdf -

03 Jul 2024, 01:40

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-276
Summary
  • (es) Ciertas versiones de software para los dispositivos Android TCL 30Z y TCL 10 contienen una aplicación vulnerable preinstalada que depende de un permiso faltante que no proporciona protección en tiempo de ejecución. El permiso que falta es necesario como permiso de acceso para los componentes de varias aplicaciones preinstaladas. En el dispositivo TCL 30Z, la aplicación vulnerable tiene un nombre de paquete de com.tcl.screenrecorder (versionCode='1221092802', versionName='v5.2120.02.12008.1.T'; versionCode='1221092805', versionName='v5.2120.02 .12008.2.T'). En el dispositivo TCL 10L, la aplicación vulnerable tiene un nombre de paquete de com.tcl.sos (versionCode='2020102827', versionName='v3.2014.12.1012.B'). Cuando una aplicación de terceros declara y solicita el permiso faltante, puede interactuar con ciertos componentes de servicio en las aplicaciones antes mencionadas (que se ejecutan con privilegios de "sistema") para realizar lecturas/escrituras de archivos arbitrarios en su contexto. Una aplicación que aproveche esta vulnerabilidad solo necesita declarar y solicitar el único permiso que falta y no se requiere ninguna interacción del usuario más allá de instalar y ejecutar una aplicación de terceros. Las huellas digitales de compilación de software para cada dispositivo vulnerable confirmado son las siguientes: TCL 10L (TCL/T770B/T1_LITE:11/RKQ1.210107.001/8BIC:user/release-keys) and TCL 30Z (TCL/4188R/Jetta_ATT:12/SP1A.210812.016/LV8E:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU5P:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU61:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU66:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU68:user/release-keys, TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6P:user/release-keys, and TCL/T602DL/Jetta_TF:12/SP1A.210812.016/vU6X:user/release-keys). Esta aplicación maliciosa declara el permiso faltante denominado com.tct.smart.switchphone.permission.SWITCH_DATA como un permiso normal, solicita el permiso faltante y lo utiliza para interactuar con el componente de servicio com.tct.smart.switchdata.DataService que está declarado. en aplicaciones vulnerables que se ejecutan con privilegios de "sistema" para realizar lecturas/escrituras de archivos arbitrarios.

22 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-22 15:15

Updated : 2024-11-21 08:13


NVD link : CVE-2023-38295

Mitre link : CVE-2023-38295

CVE.ORG link : CVE-2023-38295


JSON object : View

Products Affected

No product.

CWE
CWE-276

Incorrect Default Permissions