漏洞标题
N/A
漏洞描述信息
TCL 20XE Android设备的某些软件构建中包含一个预装的易受攻击的应用,其包名为com.tct.gcs.hiddenmenuproxy(versionCode='2',versionName='v11.0.1.0.0201.0'),由于访问控制不足,它允许本地第三方应用通过编程方式执行出厂重置。在com.tct.gcs.hiddenmenuproxy应用中利用该漏洞不需要任何权限或特殊权限。除安装和运行第三方应用外,不需要用户交互。每个确认存在漏洞的软件构建的指纹如下:TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB7I-0:user/release-keys和TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB83-0:user/release-keys。这个恶意应用向导出的com.tct.gcs.hiddenmenuproxy/.rtn.FactoryResetReceiver接收器组件发送广播意图,从而启动程序式出厂重置。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
漏洞类别
关键资源的不正确权限授予
漏洞标题
N/A
漏洞描述信息
Certain software builds for the TCL 20XE Android device contain a vulnerable, pre-installed app with a package name of com.tct.gcs.hiddenmenuproxy (versionCode='2', versionName='v11.0.1.0.0201.0') that allows local third-party apps to programmatically perform a factory reset due to inadequate access control. No permissions or special privileges are necessary to exploit the vulnerability in the com.tct.gcs.hiddenmenuproxy app. No user interaction is required beyond installing and running a third-party app. The software build fingerprints for each confirmed vulnerable build are as follows: TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB7I-0:user/release-keys and TCL/5087Z_BO/Doha_TMO:11/RP1A.200720.011/PB83-0:user/release-keys. This malicious app sends a broadcast intent to the exported com.tct.gcs.hiddenmenuproxy/.rtn.FactoryResetReceiver receiver component, which initiates a programmatic factory reset.
CVSS信息
N/A
漏洞类别
N/A
漏洞标题
TCL 20XE 安全漏洞
漏洞描述信息
TCL 20XE是TCL的一款手机。 Boost Mobile TCL 20XE 存在安全漏洞,该漏洞源于设备的某些软件版本包含易受攻击的预装应用程序(com.tct.gcs.hiddenmenuproxy),允许本地第三方应用程序以编程方式执行恢复出厂设置。
CVSS信息
N/A
漏洞类别
其他