ID

VAR-201904-0565


CVE

CVE-2018-14991


TITLE

Coolpad Defiant And multiple T-Mobile Vulnerability related to input validation in product devices

Trust: 0.8

sources: JVNDB: JVNDB-2018-015355

DESCRIPTION

The Coolpad Defiant device with a build fingerprint of Coolpad/cp3632a/cp3632a:7.1.1/NMF26F/099480857:user/release-keys, the ZTE ZMAX Pro with a build fingerprint of ZTE/P895T20/urd:6.0.1/MMB29M/20170418.114928:user/release-keys, and the T-Mobile Revvl Plus with a build fingerprint of Coolpad/alchemy/alchemy:7.1.1/143.14.171129.3701A-TMO/buildf_nj_02-206:user/release-keys all contain a vulnerable, pre-installed Rich Communication Services (RCS) app. These devices contain an that app has a package name of com.suntek.mway.rcs.app.service (versionCode=1, versionName=RCS_sdk_M_native_20161008_01; versionCode=1, versionName=RCS_sdk_M_native_20170406_01) with an exported content provider named com.suntek.mway.rcs.app.service.provider.message.MessageProvider and a refactored version of the app with a package name of com.rcs.gsma.na.sdk (versionCode=1, versionName=RCS_SDK_20170804_01) with a content provider named com.rcs.gsma.na.provider.message.MessageProvider allow any app co-located on the device to read, write, insert, and modify the user's text messages. This is enabled by an exported content provider app component that serves as a wrapper to the official content provider that contains the user's text messages. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. Coolpad Defiant , T-Mobile Revvl Plus , ZTE ZMAX Pro The device contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. There is a security vulnerability in the app.service package. Attackers can exploit this vulnerability to read, edit, insert and modify user text messages

Trust: 1.8

sources: NVD: CVE-2018-14991 // JVNDB: JVNDB-2018-015355 // VULHUB: VHN-125206 // VULMON: CVE-2018-14991

AFFECTED PRODUCTS

vendor:coolpadmodel:defiantscope:eqversion: -

Trust: 1.0

vendor:t mobilemodel:zte zmax proscope:eqversion: -

Trust: 1.0

vendor:t mobilemodel:revvl plusscope:eqversion: -

Trust: 1.0

vendor:coolpadmodel:defiantscope: - version: -

Trust: 0.8

vendor:t mobilemodel:revvl plusscope: - version: -

Trust: 0.8

vendor:t mobilemodel:zte zmax proscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-015355 // NVD: CVE-2018-14991

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-14991
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-14991
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201904-1177
value: CRITICAL

Trust: 0.6

VULHUB: VHN-125206
value: HIGH

Trust: 0.1

VULMON: CVE-2018-14991
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-14991
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-125206
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-14991
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-125206 // VULMON: CVE-2018-14991 // JVNDB: JVNDB-2018-015355 // CNNVD: CNNVD-201904-1177 // NVD: CVE-2018-14991

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-125206 // JVNDB: JVNDB-2018-015355 // NVD: CVE-2018-14991

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201904-1177

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015355

PATCH

title:Top Pageurl:https://coolpad.us/

Trust: 0.8

title:Top Pageurl:https://www.t-mobile.com/

Trust: 0.8

sources: JVNDB: JVNDB-2018-015355

EXTERNAL IDS

db:NVDid:CVE-2018-14991

Trust: 2.6

db:JVNDBid:JVNDB-2018-015355

Trust: 0.8

db:CNNVDid:CNNVD-201904-1177

Trust: 0.7

db:VULHUBid:VHN-125206

Trust: 0.1

db:VULMONid:CVE-2018-14991

Trust: 0.1

sources: VULHUB: VHN-125206 // VULMON: CVE-2018-14991 // JVNDB: JVNDB-2018-015355 // CNNVD: CNNVD-201904-1177 // NVD: CVE-2018-14991

REFERENCES

url:https://www.kryptowire.com/portal/wp-content/uploads/2018/12/defcon-26-johnson-and-stavrou-vulnerable-out-of-the-box-an-eval-of-android-carrier-devices-wp-updated.pdf

Trust: 2.6

url:https://www.kryptowire.com/portal/android-firmware-defcon-2018/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-14991

Trust: 1.4

url:https://www.kryptowire.com

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-14991

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-125206 // VULMON: CVE-2018-14991 // JVNDB: JVNDB-2018-015355 // CNNVD: CNNVD-201904-1177 // NVD: CVE-2018-14991

SOURCES

db:VULHUBid:VHN-125206
db:VULMONid:CVE-2018-14991
db:JVNDBid:JVNDB-2018-015355
db:CNNVDid:CNNVD-201904-1177
db:NVDid:CVE-2018-14991

LAST UPDATE DATE

2024-11-23T22:51:50.439000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125206date:2019-05-02T00:00:00
db:VULMONid:CVE-2018-14991date:2019-05-02T00:00:00
db:JVNDBid:JVNDB-2018-015355date:2019-05-29T00:00:00
db:CNNVDid:CNNVD-201904-1177date:2019-04-28T00:00:00
db:NVDid:CVE-2018-14991date:2024-11-21T03:50:16.303

SOURCES RELEASE DATE

db:VULHUBid:VHN-125206date:2019-04-25T00:00:00
db:VULMONid:CVE-2018-14991date:2019-04-25T00:00:00
db:JVNDBid:JVNDB-2018-015355date:2019-05-29T00:00:00
db:CNNVDid:CNNVD-201904-1177date:2019-04-25T00:00:00
db:NVDid:CVE-2018-14991date:2019-04-25T20:29:00.770