ID

VAR-201812-0117


CVE

CVE-2018-15005


TITLE

ZTE ZMAX Champ Android Vulnerabilities related to authorization, authority, and access control in devices

Trust: 0.8

sources: JVNDB: JVNDB-2018-014555

DESCRIPTION

The ZTE ZMAX Champ Android device with a build fingerprint of ZTE/Z917VL/fortune:6.0.1/MMB29M/20170327.120922:user/release-keys contains a pre-installed platform app with a package name of com.zte.zdm.sdm (versionCode=31, versionName=V5.0.3) that contains an exported broadcast receiver app component named com.zte.zdm.VdmcBroadcastReceiver that allows any app co-located on the device to programmatically initiate a factory reset. In addition, the app initiating the factory reset does not require any permissions. A factory reset will remove all user data and apps from the device. This will result in the loss of any data that have not been backed up or synced externally. The capability to perform a factory reset is not directly available to third-party apps (those that the user installs themselves with the exception of enabled Mobile Device Management (MDM) apps), although this capability can be obtained by leveraging an unprotected app component of a pre-installed platform app. ZTE ZMAX Champ Android Devices have vulnerabilities related to authorization, permissions, and access control.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. ZTE ZMAX is prone to the following security vulnerabilities: 1. An arbitrary command-execution vulnerability 2. A denial-of-service vulnerability An attacker can exploit these issues by enticing a legitimate user to use the vulnerable application to execute arbitrary commands, to cause an affected device to crash, denying service to legitimate users. ZTE ZMAX Champ is a smartphone based on the Android platform of China's ZTE Corporation (ZTE). The com.zte.zdm.sdm data package of the pre-installed platform application in ZTE ZMAX Champ (the Build fingerprint used is ZTE/Z917VL/fortune: 6.0.1/MMB29M/20170327.120922: user/release-keys) There is a security vulnerability in the .zte.zdm.VdmcBroadcastReceiver component

Trust: 2.07

sources: NVD: CVE-2018-15005 // JVNDB: JVNDB-2018-014555 // BID: 106361 // VULHUB: VHN-125221 // VULMON: CVE-2018-15005

AFFECTED PRODUCTS

vendor:zteusamodel:zte zmax champscope:eqversion:5.0.3

Trust: 1.0

vendor:ztemodel:zmax champscope:eqversion:5.0.3

Trust: 0.8

vendor:ztemodel:zmax zmax proscope:eqversion:6.0.1

Trust: 0.3

vendor:ztemodel:zmax champscope:eqversion:6.0.1

Trust: 0.3

sources: BID: 106361 // JVNDB: JVNDB-2018-014555 // NVD: CVE-2018-15005

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-15005
value: HIGH

Trust: 1.0

NVD: CVE-2018-15005
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201812-1258
value: HIGH

Trust: 0.6

VULHUB: VHN-125221
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-15005
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-15005
severity: MEDIUM
baseScore: 5.6
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-125221
severity: MEDIUM
baseScore: 5.6
vectorString: AV:L/AC:L/AU:N/C:N/I:P/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-15005
baseSeverity: HIGH
baseScore: 7.1
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-125221 // VULMON: CVE-2018-15005 // JVNDB: JVNDB-2018-014555 // CNNVD: CNNVD-201812-1258 // NVD: CVE-2018-15005

PROBLEMTYPE DATA

problemtype:CWE-862

Trust: 1.1

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-125221 // JVNDB: JVNDB-2018-014555 // NVD: CVE-2018-15005

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201812-1258

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201812-1258

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014555

PATCH

title:Top Pageurl:https://www.zte.com.cn/global/

Trust: 0.8

sources: JVNDB: JVNDB-2018-014555

EXTERNAL IDS

db:BIDid:106361

Trust: 2.9

db:NVDid:CVE-2018-15005

Trust: 2.9

db:JVNDBid:JVNDB-2018-014555

Trust: 0.8

db:CNNVDid:CNNVD-201812-1258

Trust: 0.7

db:VULHUBid:VHN-125221

Trust: 0.1

db:VULMONid:CVE-2018-15005

Trust: 0.1

sources: VULHUB: VHN-125221 // VULMON: CVE-2018-15005 // BID: 106361 // JVNDB: JVNDB-2018-014555 // CNNVD: CNNVD-201812-1258 // NVD: CVE-2018-15005

REFERENCES

url:http://www.securityfocus.com/bid/106361

Trust: 2.7

url:https://www.kryptowire.com/portal/wp-content/uploads/2018/12/defcon-26-johnson-and-stavrou-vulnerable-out-of-the-box-an-eval-of-android-carrier-devices-wp-updated.pdf

Trust: 2.6

url:https://www.kryptowire.com/portal/android-firmware-defcon-2018/

Trust: 2.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-15005

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-15005

Trust: 0.8

url:https://www.kryptowire.com/android-firmware-defcon-2018/

Trust: 0.8

url:http://wwwen.zte.com.cn/en/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/862.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-125221 // VULMON: CVE-2018-15005 // BID: 106361 // JVNDB: JVNDB-2018-014555 // CNNVD: CNNVD-201812-1258 // NVD: CVE-2018-15005

CREDITS

Kyrptowire

Trust: 0.3

sources: BID: 106361

SOURCES

db:VULHUBid:VHN-125221
db:VULMONid:CVE-2018-15005
db:BIDid:106361
db:JVNDBid:JVNDB-2018-014555
db:CNNVDid:CNNVD-201812-1258
db:NVDid:CVE-2018-15005

LAST UPDATE DATE

2024-11-23T22:06:27.657000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125221date:2019-10-03T00:00:00
db:VULMONid:CVE-2018-15005date:2019-10-03T00:00:00
db:BIDid:106361date:2018-12-28T00:00:00
db:JVNDBid:JVNDB-2018-014555date:2019-03-26T00:00:00
db:CNNVDid:CNNVD-201812-1258date:2019-10-23T00:00:00
db:NVDid:CVE-2018-15005date:2024-11-21T03:50:20.210

SOURCES RELEASE DATE

db:VULHUBid:VHN-125221date:2018-12-28T00:00:00
db:VULMONid:CVE-2018-15005date:2018-12-28T00:00:00
db:BIDid:106361date:2018-12-28T00:00:00
db:JVNDBid:JVNDB-2018-014555date:2019-03-26T00:00:00
db:CNNVDid:CNNVD-201812-1258date:2018-12-29T00:00:00
db:NVDid:CVE-2018-15005date:2018-12-28T21:29:00.947