VARIoT IoT vulnerabilities database

VAR-201911-0519 | CVE-2019-15354 | Ulefone Armor 5 Android Lack of authentication on device |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Ulefone Armor 5 Android device with a build fingerprint of Ulefone/Ulefone_Armor_5/Ulefone_Armor_5:8.1.0/O11019/1528806701:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Ulefone Armor 5 Android The device is vulnerable to a lack of authentication.Information may be tampered with. Ulefone Armor 5 is a smartphone from China's Ulefone.
Ulefone Armor 5 has an unknown vulnerability. An attacker could use this vulnerability to modify system properties
VAR-201911-0582 | CVE-2019-15466 | Xiaomi Redmi 6 Pro access control error vulnerability |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
The Xiaomi Redmi 6 Pro Android device with a build fingerprint of xiaomi/sakura_india/sakura_india:8.1.0/OPM1.171019.019/V10.2.6.0.ODMMIXM:user/release-keys contains a pre-installed app with a package name of com.huaqin.factory app (versionCode=1, versionName=QL1715_201812191721) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device. Xiaomi Redmi 6 Pro Android The device is vulnerable to an externally controllable reference to another area resource.Information may be altered. Xiaomi Redmi 6 Pro is a smartphone from the Chinese company Xiaomi.
The com.huaqin.factory app in Xiaomi Redmi 6 Pro (build fingerprint: xiaomi/sakura_india/sakura_india:8.1.0/OPM1.171019.019/V10.2.6.0.ODMMIXM:user/release-keys) has an access control error vulnerability. The vulnerability stems from the network system or product improperly restricting access to resources from unauthorized roles. No detailed vulnerability details are currently provided
VAR-201911-0510 | CVE-2019-15345 | Tecno Camon iClick Android Vulnerability with improper permission assignment to critical resources on devices |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The Tecno Camon iClick Android device with a build fingerprint of TECNO/H633/TECNO-IN6:8.1.0/O11019/A-180409V96:user/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.0.8). This app contains an exported service named com.lovelyfont.manager.service.FunctionService that allows any app co-located on the device to supply the file path to a Dalvik Executable (DEX) file which it will dynamically load within its own process and execute in with its own system privileges. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing code as the system user can allow a third-party app to factory reset the device, obtain the user's Wi-Fi passwords, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more. Tecno Camon iClick Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Tecno Camon iClick is a smartphone from China Transsion.
Tecno Camon iClick has an unknown vulnerability. And text messages
VAR-201911-0546 | CVE-2019-15430 | Bluboo D3 Pro Android Vulnerability with improper permission assignment to critical resources on devices |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Bluboo D3 Pro Android device with a build fingerprint of BLUBOO/Bluboo_D2_Pro/Bluboo_D2_Pro:7.0/NRD90M/1510370501:user/release-keys contains a pre-installed app with a package name of com.qiku.cleaner app (versionCode=2, versionName=2.0.0_VER_32516508295515) that allows other pre-installed apps to perform system properties modification via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Bluboo D3 Pro Android Devices are vulnerable to improper assignment of permissions to critical resources.Information may be tampered with. Bluboo D3 Pro is a smartphone.
Bluboo D3 Pro has an unknown vulnerability. An attacker could use this pre-installed software to exploit this vulnerability to modify system properties
VAR-201911-0492 | CVE-2019-15423 | Bluboo Bluboo_S1 Android Vulnerability related to externally controllable references to other domain resources on devices |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
The Bluboo Bluboo_S1 Android device with a build fingerprint of BLUBOO/Bluboo_S1/Bluboo_S1:7.0/NRD90M/1495809471:user/release-keys contains a pre-installed app with a package name of com.mediatek.factorymode app (versionCode=1, versionName=1) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device. Bluboo Bluboo_S1 Android The device is vulnerable to an externally controllable reference to another realm resource.Information may be tampered with. Bluboo Bluboo_S1 is a smartphone.
The com.mediatek.factorymode app in Bluboo Bluboo_S1 (build fingerprint: BLUBOO / Bluboo_S1 / Bluboo_S1: 7.0 / NRD90M / 1495809471: user / release-keys) has a security vulnerability. This vulnerability could be used by an attacker to unauthorizedly modify wireless settings by other applications on the device
VAR-201911-0521 | CVE-2019-15356 | Lava Flair Z1 Android Lack of authentication on device |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Lava Flair Z1 Android device with a build fingerprint of LAVA/Z1/Z1:8.1.0/O11019/1536680131:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Lava Flair Z1 Android The device is vulnerable to a lack of authentication.Information may be tampered with. An attacker could use this vulnerability to modify system properties
VAR-201911-0584 | CVE-2019-15468 | Xiaomi Mi A2 Lite Android Vulnerability related to externally controllable references to other domain resources on devices |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Xiaomi Mi A2 Lite Android device with a build fingerprint of xiaomi/daisy/daisy_sprout:9/PKQ1.180917.001/V10.0.3.0.PDLMIXM:user/release-keys contains a pre-installed app with a package name of com.huaqin.factory app (versionCode=1, versionName=QL1715_201812071953) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device. Xiaomi Mi A2 Lite Android The device is vulnerable to an externally controllable reference to another realm resource.Information may be tampered with. Xiaomi Mi A2 Lite is a smartphone from China Xiaomi Technology. An attacker could exploit the vulnerability to modify the wireless settings
VAR-201911-0482 | CVE-2019-15413 | ASUS ZenFone 3 Ultra Access Control Error Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The Asus ZenFone 3 Ultra Android device with a build fingerprint of asus/WW_Phone/ASUS_A001:7.0/NRD90M/14.1010.1804.75-20180612:user/release-keys contains a pre-installed app with a package name of com.asus.splendidcommandagent app (versionCode=1510200105, versionName=1.2.0.21_180605) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ZenFone 3 Ultra Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ZenFone 3 Ultra is a smartphone from ASUS, Taiwan.
ASUS ZenFone 3 Ultra has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component
VAR-201911-0479 | CVE-2019-15410 | Asus ZenFone 5Q Android Vulnerability with improper permission assignment to critical resources on devices |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The Asus ZenFone 5Q Android device with a build fingerprint of asus/WW_Phone/ASUS_X017D_2:7.1.1/NGI77B/14.0400.1809.059-20181016:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ZenFone 5Q Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ZenFone 5Q is a smartphone from ASUS, Taiwan.
ASUS ZenFone 5Q has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component
VAR-201911-0536 | CVE-2019-15371 | Symphony G100 Access Control Error Vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Symphony G100 Android device with a build fingerprint of Symphony/G100/G100:8.1.0/O11019/1530618779:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Symphony G100 Android The device is vulnerable to a lack of authentication.Information may be tampered with. Symphony G100 is a smartphone.
Symphony G100 has an access control error vulnerability. An attacker could use this vulnerability to modify system properties
VAR-201911-0497 | CVE-2019-15332 | Lava Z61 Android Vulnerability with improper permission assignment to critical resources on devices |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
The Lava Z61 Android device with a build fingerprint of LAVA/Z61_2GB/Z61_2GB:8.1.0/O11019/1533889281:user/release-keys contains a pre-installed app with a package name of com.android.lava.powersave app (versionCode=400, versionName=v4.0.27) that allows any app co-located on the device to programmatically disable and enable Wi-Fi without the corresponding access permission through an exported interface. Lava Z61 Android Devices are vulnerable to improper assignment of permissions to critical resources.Information may be tampered with. Lava Z61 is a smart phone from Lava, India.
Lava Z61 has an unknown vulnerability. An attacker could use this vulnerability to unauthorizedly switch Wi-Fi on
VAR-201911-0566 | CVE-2019-15450 | Samsung j3popeltecan Access Control Error Vulnerability |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The Samsung j3popeltecan Android device with a build fingerprint of samsung/j3popeltevl/j3popeltecan:8.1.0/M1AJQ/J327WVLS3BSA2:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000100, versionName=7.0.1.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Samsung j7popeltemtr Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Samsung j3popeltecan is a smartphone from Samsung in South Korea.
Samsung j3popeltecan has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to perform application installation through an accessible application component
VAR-201911-0491 | CVE-2019-15422 | Doogee Mix Android Vulnerability related to externally controllable references to other domain resources on devices |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
The Doogee Mix Android device with a build fingerprint of DOOGEE/MIX/MIX:7.0/NRD90M/1495809471:user/release-keys contains a pre-installed app with a package name of com.mediatek.factorymode app (versionCode=1, versionName=1) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device. Doogee Mix Android The device is vulnerable to an externally controllable reference to another realm resource.Information may be tampered with. Doogee Mix is a smartphone from China Doogee.
The com.mediatek.factorymode app in Doogee Mix (build fingerprint: DOOGEE / MIX / MIX: 7.0 / NRD90M / 1495809471: user / release-keys) has a security vulnerability. This vulnerability could be used by an attacker to unauthorizedly modify wireless settings by other applications on the device
VAR-201911-0467 | CVE-2019-15398 | Asus ZenFone 4 Selfie Android Vulnerability with improper permission assignment to critical resources on devices |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The Asus ZenFone 4 Selfie Android device with a build fingerprint of asus/WW_Z01M/ASUS_Z01M_1:7.1.1/NMF26F/WW_user_11.40.208.77_20170922:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000015, versionName=7.0.0.3_161222) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Asus ZenFone 4 Selfie Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUS ZenFone 4 Selfie is a smartphone from ASUS, Taiwan.
ASUS ZenFone 4 Selfie has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to execute commands through an accessible application component
VAR-201911-0504 | CVE-2019-15339 | Lava Z60s Android Vulnerability with improper permission assignment to critical resources on devices |
CVSS V2: 2.1 CVSS V3: 3.3 Severity: LOW |
The Lava Z60s Android device with a build fingerprint of LAVA/Z60s/Z60s:8.1.0/O11019/1530331229:user/release-keys contains a pre-installed app with a package name of com.android.lava.powersave app (versionCode=400, versionName=v4.0.27) that allows any app co-located on the device to programmatically disable and enable Wi-Fi without the corresponding access permission through an exported interface. Lava Z60s Android Devices are vulnerable to improper assignment of permissions to critical resources.Information may be tampered with
VAR-201911-1314 | CVE-2019-15802 | Zyxel GS1900 Vulnerabilities related to the use of hard-coded credentials in device firmware |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) are used to encrypt and decrypt all passwords using AES256 in CBC mode. With the parameters known, all previously encrypted passwords can be decrypted. This includes the passwords that are part of configuration backups or otherwise embedded as part of the firmware. Zyxel GS1900 Device firmware contains a vulnerability related to the use of hard-coded credentials.Information may be obtained. The ZyXEL GS1900 is a managed switch from ZyXEL, Taiwan.
A security hole exists in the Zyxel GS1900 with this version of firmware prior to 2.50 (AAHH.0)C0
VAR-201911-0550 | CVE-2019-15434 | Samsung A5 Access Control Error Vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
The Samsung A5 Android device with a build fingerprint of samsung/a5y17ltexx/a5y17lte:8.0.0/R16NW/A520FXXS8CSC5:user/release-keys contains a pre-installed app with a package name of com.samsung.android.themecenter app (versionCode=7000000, versionName=7.0.0.0) that allows other pre-installed apps to perform app installation via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. Samsung A5 Android The device is vulnerable to improper assignment of permissions to critical resources.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Samsung A5 is a smartphone from Samsung in South Korea.
The Samsung A5 has an access control error vulnerability. The vulnerability stems from a network system or product that did not properly restrict access to resources from unauthorized roles. An attacker could use this vulnerability to perform application installation through an accessible application component
VAR-201911-0452 | CVE-2019-15383 | Allview X5 Android Lack of authentication on device |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Allview X5 Android device with a build fingerprint of ALLVIEW/X5_Soul_Mini/X5_Soul_Mini:8.1.0/O11019/1522468763:userdebug/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Allview X5 Android The device is vulnerable to a lack of authentication.Information may be tampered with. Allview X5 is a smartphone.
Allview X5 has an unknown vulnerability. An attacker could use this vulnerability to modify system properties
VAR-201911-0514 | CVE-2019-15349 | Tecno Camon Android Vulnerability with improper permission assignment to critical resources on devices |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
The Tecno Camon Android device with a build fingerprint of TECNO/H612/TECNO-ID5a:8.1.0/O11019/F-180828V106:user/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.0.11). This app contains an exported service named com.lovelyfont.manager.service.FunctionService that allows any app co-located on the device to supply the file path to a Dalvik Executable (DEX) file which it will dynamically load within its own process and execute in with its own system privileges. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing code as the system user can allow a third-party app to factory reset the device, obtain the user's Wi-Fi passwords, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more. Tecno Camon Android Devices are vulnerable to improper assignment of permissions to critical resources.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Tecno Camon is a Camon series smartphone from China Transsion.
Tecno Camon has an unknown vulnerability. And text messages
VAR-201911-0540 | CVE-2019-15375 | Haier G8 Android Lack of authentication on device |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
The Haier G8 Android device with a build fingerprint of Haier/HM-G559-FL/G8:8.1.0/O11019/1522294799:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. Haier G8 Android The device is vulnerable to a lack of authentication.Information may be tampered with. Haier G8 is a smartphone from Haier of China.
Haier G8 has an access control error vulnerability. An attacker could use this vulnerability to modify system properties