ID

VAR-201904-0569


CVE

CVE-2018-14997


TITLE

Leagoo P1 Vulnerabilities related to authorization, authority, and access control in devices

Trust: 0.8

sources: JVNDB: JVNDB-2018-015352

DESCRIPTION

The Leagoo P1 Android device with a build fingerprint of sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys contains the android framework (i.e., system_server) with a package name of android that has been modified by Leagoo or another entity in the supply chain. The system_server process in the core Android package has an exported broadcast receiver that allows any app co-located on the device to programmatically initiate the taking of a screenshot and have the resulting screenshot be written to external storage. The taking of a screenshot is not transparent to the user; the device has a screen animation as the screenshot is taken and there is a notification indicating that a screenshot occurred. If the attacking app also requests the EXPAND_STATUS_BAR permission, it can wake the device up using certain techniques and expand the status bar to take a screenshot of the user's notifications even if the device has an active screen lock. The notifications may contain sensitive data such as text messages used in two-factor authentication. The system_server process that provides this capability cannot be disabled, as it is part of the Android framework. The notification can be removed by a local Denial of Service (DoS) attack to reboot the device. Leagoo P1 Devices have vulnerabilities related to authorization, permissions, and access control.Information may be obtained. Leagoo P1 is a smart phone based on Android platform produced by Leagoo Technology Company of China. There is a security vulnerability in Leagoo P1 (build fingerprint is sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys). Attackers can exploit this vulnerability to take screenshots of mobile phones, obtain information or remove notifications

Trust: 1.71

sources: NVD: CVE-2018-14997 // JVNDB: JVNDB-2018-015352 // VULHUB: VHN-125212

AFFECTED PRODUCTS

vendor:leagoomodel:p1scope:eqversion: -

Trust: 1.0

vendor:leagoo globalmodel:p1scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2018-015352 // NVD: CVE-2018-14997

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-14997
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-14997
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201904-1183
value: MEDIUM

Trust: 0.6

VULHUB: VHN-125212
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2018-14997
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-125212
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-14997
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-125212 // JVNDB: JVNDB-2018-015352 // CNNVD: CNNVD-201904-1183 // NVD: CVE-2018-14997

PROBLEMTYPE DATA

problemtype:CWE-862

Trust: 1.1

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-125212 // JVNDB: JVNDB-2018-015352 // NVD: CVE-2018-14997

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201904-1183

TYPE

permissions and access control issues

Trust: 0.6

sources: CNNVD: CNNVD-201904-1183

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015352

PATCH

title:P1url:https://www.leagoo.com/products/P1/spec.html

Trust: 0.8

sources: JVNDB: JVNDB-2018-015352

EXTERNAL IDS

db:NVDid:CVE-2018-14997

Trust: 2.5

db:JVNDBid:JVNDB-2018-015352

Trust: 0.8

db:CNNVDid:CNNVD-201904-1183

Trust: 0.7

db:VULHUBid:VHN-125212

Trust: 0.1

sources: VULHUB: VHN-125212 // JVNDB: JVNDB-2018-015352 // CNNVD: CNNVD-201904-1183 // NVD: CVE-2018-14997

REFERENCES

url:https://www.kryptowire.com/portal/android-firmware-defcon-2018/

Trust: 1.7

url:https://www.kryptowire.com/portal/wp-content/uploads/2018/12/defcon-26-johnson-and-stavrou-vulnerable-out-of-the-box-an-eval-of-android-carrier-devices-wp-updated.pdf

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-14997

Trust: 1.4

url:https://www.kryptowire.com

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-14997

Trust: 0.8

url:https://www.kryptowire.com/android-firmware-defcon-2018/

Trust: 0.8

sources: VULHUB: VHN-125212 // JVNDB: JVNDB-2018-015352 // CNNVD: CNNVD-201904-1183 // NVD: CVE-2018-14997

SOURCES

db:VULHUBid:VHN-125212
db:JVNDBid:JVNDB-2018-015352
db:CNNVDid:CNNVD-201904-1183
db:NVDid:CVE-2018-14997

LAST UPDATE DATE

2024-11-23T22:48:24.828000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-125212date:2019-10-03T00:00:00
db:JVNDBid:JVNDB-2018-015352date:2019-05-29T00:00:00
db:CNNVDid:CNNVD-201904-1183date:2019-10-08T00:00:00
db:NVDid:CVE-2018-14997date:2024-11-21T03:50:18.127

SOURCES RELEASE DATE

db:VULHUBid:VHN-125212date:2019-04-25T00:00:00
db:JVNDBid:JVNDB-2018-015352date:2019-05-29T00:00:00
db:CNNVDid:CNNVD-201904-1183date:2019-04-25T00:00:00
db:NVDid:CVE-2018-14997date:2019-04-25T20:29:01.287