ID

VAR-201812-0115


CVE

CVE-2018-15002


TITLE

Vivo V7 Vulnerability related to information disclosure from log files on devices

Trust: 0.8

sources: JVNDB: JVNDB-2018-014388

DESCRIPTION

The Vivo V7 device with a build fingerprint of vivo/1718/1718:7.1.2/N2G47H/compil11021857:user/release-keys allows any app co-located on the device to set system properties as the com.android.phone user. The com.qualcomm.qti.modemtestmode app (versionCode=25, versionName=7.1.2) that contains an exported service named com.qualcomm.qti.modemtestmode.MbnTestService that allows any app co-located on the device to provide key-value pairs to set certain system properties. Notably, system properties with the persist.* prefix can be set which will survive a reboot. On the Vivo V7 device, when the persist.sys.input.log property is set to have a value of yes, the user's screen touches be written to the logcat log by the InputDispatcher for all apps. The system-wide logcat log can be obtained from external storage via a different known vulnerability on the device. The READ_EXTERNAL_STORAGE permission is necessary to access the log files containing the user's touch coordinates. With some effort, the user's touch coordinates can be mapped to key presses on a keyboard. The Vivo V7 is a smartphone from China's Vivo mobile communications company. An attacker could exploit this vulnerability to set system properties as the com.android.phone user

Trust: 1.71

sources: NVD: CVE-2018-15002 // JVNDB: JVNDB-2018-014388 // VULHUB: VHN-125218

AFFECTED PRODUCTS

vendor:vivomodel:v7scope:eqversion:7.1.2

Trust: 1.8

sources: JVNDB: JVNDB-2018-014388 // NVD: CVE-2018-15002

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15002
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-15002
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201812-1256
value: LOW

Trust: 0.6

VULHUB: VHN-125218
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2018-15002
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-125218
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15002
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.0
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-125218 // JVNDB: JVNDB-2018-014388 // CNNVD: CNNVD-201812-1256 // NVD: CVE-2018-15002

PROBLEMTYPE DATA

problemtype:CWE-532

Trust: 1.9

sources: VULHUB: VHN-125218 // JVNDB: JVNDB-2018-014388 // NVD: CVE-2018-15002

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201812-1256

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014388

PATCH

title:V7url:https://www.vivo.com/in/products/v7

Trust: 0.8

sources: JVNDB: JVNDB-2018-014388

EXTERNAL IDS

db:NVDid:CVE-2018-15002

Trust: 2.5

db:JVNDBid:JVNDB-2018-014388

Trust: 0.8

db:CNNVDid:CNNVD-201812-1256

Trust: 0.7

db:VULHUBid:VHN-125218

Trust: 0.1

sources: VULHUB: VHN-125218 // JVNDB: JVNDB-2018-014388 // CNNVD: CNNVD-201812-1256 // NVD: CVE-2018-15002

REFERENCES

url:https://www.kryptowire.com/portal/android-firmware-defcon-2018/

Trust: 2.5

url:https://www.kryptowire.com/portal/wp-content/uploads/2018/12/defcon-26-johnson-and-stavrou-vulnerable-out-of-the-box-an-eval-of-android-carrier-devices-wp-updated.pdf

Trust: 2.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15002

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15002

Trust: 0.8

sources: VULHUB: VHN-125218 // JVNDB: JVNDB-2018-014388 // CNNVD: CNNVD-201812-1256 // NVD: CVE-2018-15002

SOURCES

db:VULHUBid:VHN-125218
db:JVNDBid:JVNDB-2018-014388
db:CNNVDid:CNNVD-201812-1256
db:NVDid:CVE-2018-15002

LAST UPDATE DATE

2024-11-23T22:37:57.813000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125218date:2019-02-07T00:00:00
db:JVNDBid:JVNDB-2018-014388date:2019-03-19T00:00:00
db:CNNVDid:CNNVD-201812-1256date:2019-02-13T00:00:00
db:NVDid:CVE-2018-15002date:2024-11-21T03:50:19.537

SOURCES RELEASE DATE

db:VULHUBid:VHN-125218date:2018-12-28T00:00:00
db:JVNDBid:JVNDB-2018-014388date:2019-03-19T00:00:00
db:CNNVDid:CNNVD-201812-1256date:2018-12-29T00:00:00
db:NVDid:CVE-2018-15002date:2018-12-28T21:29:00.840