First published: Mon Aug 25 2014(Updated: )
The cmd_boot function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to bypass intended device-lock and kernel-signature restrictions by using fastboot mode in a boot command for an arbitrary kernel image.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Little Kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4325 is classified as a high severity vulnerability due to its potential to allow unauthorized access to device functionality.
To fix CVE-2014-4325, update the Little Kernel bootloader to a patched version that addresses this vulnerability.
CVE-2014-4325 affects MSM devices utilizing the Little Kernel bootloader as part of Android contributions from Qualcomm Innovation Center.
CVE-2014-4325 requires physical access to the device to exploit, as it involves using fastboot mode.
Exploiting CVE-2014-4325 can allow an attacker to bypass device lock and kernel signature restrictions, leading to unauthorized control of the device.