ID

VAR-201911-0480


CVE

CVE-2019-15411


TITLE

ASUS ZenFone 3 Laser Access Control Error Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2020-14726 // CNNVD: CNNVD-201911-914

DESCRIPTION

The Asus ZenFone 3 Laser Android device with a build fingerprint of asus/WW_msm8937/msm8937:7.1.1/NMF26F/WW_32.40.106.114_20180928:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ZenFone 3 Laser Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ZenFone 3 Laser is a smartphone from ASUS, Taiwan. ASUS ZenFone 3 Laser has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component

Trust: 2.25

sources: NVD: CVE-2019-15411 // JVNDB: JVNDB-2019-012359 // CNVD: CNVD-2020-14726 // VULMON: CVE-2019-15411

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-14726

AFFECTED PRODUCTS

vendor:asusmodel:zenfone 3 laserscope:eqversion: -

Trust: 1.0

vendor:asustek computermodel:zenfone 3 laserscope: - version: -

Trust: 0.8

vendor:asusmodel:zenfone laserscope:eqversion:3

Trust: 0.6

sources: CNVD: CNVD-2020-14726 // JVNDB: JVNDB-2019-012359 // NVD: CVE-2019-15411

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-15411
value: HIGH

Trust: 1.0

NVD: CVE-2019-15411
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-14726
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201911-914
value: HIGH

Trust: 0.6

VULMON: CVE-2019-15411
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-15411
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2020-14726
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-15411
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-15411
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-14726 // VULMON: CVE-2019-15411 // JVNDB: JVNDB-2019-012359 // CNNVD: CNNVD-201911-914 // NVD: CVE-2019-15411

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-732

Trust: 0.8

sources: JVNDB: JVNDB-2019-012359 // NVD: CVE-2019-15411

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201911-914

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201911-914

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-012359

PATCH

title:ZenFone 3 Laser (ZC551KL)url:https://www.asus.com/us/supportonly/ASUS%20ZenFone%203%20Laser%20(ZC551KL)/HelpDesk/

Trust: 0.8

sources: JVNDB: JVNDB-2019-012359

EXTERNAL IDS

db:NVDid:CVE-2019-15411

Trust: 3.1

db:JVNDBid:JVNDB-2019-012359

Trust: 0.8

db:CNVDid:CNVD-2020-14726

Trust: 0.6

db:CNNVDid:CNNVD-201911-914

Trust: 0.6

db:VULMONid:CVE-2019-15411

Trust: 0.1

sources: CNVD: CNVD-2020-14726 // VULMON: CVE-2019-15411 // JVNDB: JVNDB-2019-012359 // CNNVD: CNNVD-201911-914 // NVD: CVE-2019-15411

REFERENCES

url:https://www.kryptowire.com/android-firmware-2019/

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-15411

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-15411

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2020-14726 // VULMON: CVE-2019-15411 // JVNDB: JVNDB-2019-012359 // CNNVD: CNNVD-201911-914 // NVD: CVE-2019-15411

SOURCES

db:CNVDid:CNVD-2020-14726
db:VULMONid:CVE-2019-15411
db:JVNDBid:JVNDB-2019-012359
db:CNNVDid:CNNVD-201911-914
db:NVDid:CVE-2019-15411

LAST UPDATE DATE

2024-11-23T23:04:35.947000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-14726date:2020-03-01T00:00:00
db:VULMONid:CVE-2019-15411date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2019-012359date:2019-11-29T00:00:00
db:CNNVDid:CNNVD-201911-914date:2020-08-25T00:00:00
db:NVDid:CVE-2019-15411date:2024-11-21T04:28:40.027

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-14726date:2020-03-01T00:00:00
db:VULMONid:CVE-2019-15411date:2019-11-14T00:00:00
db:JVNDBid:JVNDB-2019-012359date:2019-11-29T00:00:00
db:CNNVDid:CNNVD-201911-914date:2019-11-14T00:00:00
db:NVDid:CVE-2019-15411date:2019-11-14T17:15:20.567