ID

VAR-201812-0112


CVE

CVE-2018-14995


TITLE

plural ZTE Android Vulnerability related to information leakage from log files in device products

Trust: 0.8

sources: JVNDB: JVNDB-2018-014392

DESCRIPTION

The ZTE Blade Vantage Android device with a build fingerprint of ZTE/Z839/sweet:7.1.1/NMF26V/20180120.095344:user/release-keys, the ZTE Blade Spark Android device with a build fingerprint of ZTE/Z971/peony:7.1.1/NMF26V/20171129.143111:user/release-keys, the ZTE ZMAX Pro Android device with a build fingerprint of ZTE/P895T20/urd:6.0.1/MMB29M/20170418.114928:user/release-keys, and the ZTE ZMAX Champ Android device with a build fingerprint of ZTE/Z917VL/fortune:6.0.1/MMB29M/20170327.120922:user/release-keys contain a pre-installed platform app with a package name of com.android.modem.service (versionCode=25, versionName=7.1.1; versionCode=23, versionName=6.0.1) that exports an interface to any app on co-located on the device. Using the exported interface of the com.android.modem.service app, any app can enable and obtain certain log files (modem and logcat) without the appropriate corresponding access permissions. The modem logs contain the phone number and full text body of incoming and outgoing text messages in binary format. In addition, the modem log contains the phone numbers for both incoming and outgoing phone calls. The system-wide logcat logs (those obtained via the logcat binary) tend to contain sensitive user data. Third-party apps are prevented from directly reading the system-wide logcat logs. The capability to read from the system-wide logcat logs is only available to pre-installed system apps and platform apps. The modem log and/or logcat log, once activated, get written to external storage (SD card). An app aware of this vulnerability can enable the logs, parse them for relevant data, and exfiltrate them from the device. The modem log and logcat log are inactive by default, but a third-party app with no permissions can activate them, although the app will need to be granted the READ_EXTERNAL_STORAGE permission to access them. plural ZTE Android Device products contain a vulnerability related to information disclosure from log files.Information may be obtained. ZTE Blade Vantage and others are Android-based smartphones from the Chinese company ZTE Corporation (ZTE). There are security vulnerabilities in the com.android.modem.service data package of pre-installed platform applications in various ZTE devices. Attackers can exploit this vulnerability to obtain modem and logcat log files

Trust: 1.71

sources: NVD: CVE-2018-14995 // JVNDB: JVNDB-2018-014392 // VULHUB: VHN-125210

AFFECTED PRODUCTS

vendor:zteusamodel:zte blade sparkscope:eqversion:7.1.1

Trust: 1.0

vendor:zteusamodel:zte blade vantagescope:eqversion:7.1.1

Trust: 1.0

vendor:zteusamodel:zte zmax champscope:eqversion:6.0.1

Trust: 1.0

vendor:zteusamodel:zte zmax proscope:eqversion:6.0.1

Trust: 1.0

vendor:zte usamodel:blade sparkscope: - version: -

Trust: 0.8

vendor:zte usamodel:blade vantagescope: - version: -

Trust: 0.8

vendor:zte usamodel:zmax champscope: - version: -

Trust: 0.8

vendor:zte usamodel:zmax proscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-014392 // NVD: CVE-2018-14995

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-14995
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-14995
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201812-1253
value: LOW

Trust: 0.6

VULHUB: VHN-125210
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2018-14995
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-125210
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-14995
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.0
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-125210 // JVNDB: JVNDB-2018-014392 // CNNVD: CNNVD-201812-1253 // NVD: CVE-2018-14995

PROBLEMTYPE DATA

problemtype:CWE-532

Trust: 1.9

sources: VULHUB: VHN-125210 // JVNDB: JVNDB-2018-014392 // NVD: CVE-2018-14995

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201812-1253

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014392

PATCH

title:Top Pageurl:https://www.zteusa.com/

Trust: 0.8

sources: JVNDB: JVNDB-2018-014392

EXTERNAL IDS

db:NVDid:CVE-2018-14995

Trust: 2.5

db:JVNDBid:JVNDB-2018-014392

Trust: 0.8

db:CNNVDid:CNNVD-201812-1253

Trust: 0.7

db:VULHUBid:VHN-125210

Trust: 0.1

sources: VULHUB: VHN-125210 // JVNDB: JVNDB-2018-014392 // CNNVD: CNNVD-201812-1253 // NVD: CVE-2018-14995

REFERENCES

url:https://www.kryptowire.com/portal/android-firmware-defcon-2018/

Trust: 2.5

url:https://www.kryptowire.com/portal/wp-content/uploads/2018/12/defcon-26-johnson-and-stavrou-vulnerable-out-of-the-box-an-eval-of-android-carrier-devices-wp-updated.pdf

Trust: 2.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-14995

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-14995

Trust: 0.8

sources: VULHUB: VHN-125210 // JVNDB: JVNDB-2018-014392 // CNNVD: CNNVD-201812-1253 // NVD: CVE-2018-14995

SOURCES

db:VULHUBid:VHN-125210
db:JVNDBid:JVNDB-2018-014392
db:CNNVDid:CNNVD-201812-1253
db:NVDid:CVE-2018-14995

LAST UPDATE DATE

2024-11-23T22:12:12.758000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125210date:2019-02-07T00:00:00
db:JVNDBid:JVNDB-2018-014392date:2019-03-19T00:00:00
db:CNNVDid:CNNVD-201812-1253date:2019-02-13T00:00:00
db:NVDid:CVE-2018-14995date:2024-11-21T03:50:17.660

SOURCES RELEASE DATE

db:VULHUBid:VHN-125210date:2018-12-28T00:00:00
db:JVNDBid:JVNDB-2018-014392date:2019-03-19T00:00:00
db:CNNVDid:CNNVD-201812-1253date:2018-12-29T00:00:00
db:NVDid:CVE-2018-14995date:2018-12-28T21:29:00.683