CWE
200
Advisory Published
Updated

CVE-2016-10135: Infoleak

First published: Fri Jan 13 2017(Updated: )

An issue was discovered on LG devices using the MTK chipset with L(5.0/5.1), M(6.0/6.0.1), and N(7.0) software, and RCA Voyager Tablet, BLU Advance 5.0, and BLU R1 HD devices. The MTKLogger app with a package name of com.mediatek.mtklogger has application components that are accessible to any application that resides on the device. Namely, the com.mediatek.mtklogger.framework.LogReceiver and com.mediatek.mtklogger.framework.MTKLoggerService application components are exported since they contain an intent filter, are not protected by a custom permission, and do not explicitly set the android:exported attribute to false. Therefore, these components are exported by default and are thus accessible to any third party application by using android.content.Intent object for communication. These application components can be used to start and stop the logs using Intent objects with embedded data. The available logs are the GPS log, modem log, network log, and mobile log. The base directory that contains the directories for the 4 types of logs is /sdcard/mtklog which makes them accessible to apps that require the READ_EXTERNAL_STORAGE permission. The GPS log contains the GPS coordinates of the user as well as a timestamp for the coordinates. The modem log contains AT commands and their parameters which allow the user's outgoing and incoming calls and text messages to be obtained. The network log is a tcpdump network capture. The mobile log contains the Android log, which is not available to third-party apps as of Android 4.1. The LG ID is LVE-SMP-160019.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
LG Electronics LG Mobile Handset=5.0
LG Electronics LG Mobile Handset=5.1
LG Electronics LG Mobile Handset=6.0
LG Electronics LG Mobile Handset=6.0.1
LG Electronics LG Mobile Handset=7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-10135?

    CVE-2016-10135 has a moderate severity rating due to the potential exposure of sensitive application components.

  • How do I fix CVE-2016-10135?

    Fixing CVE-2016-10135 involves updating the affected LG devices to the latest software version provided by LG.

  • Which devices are affected by CVE-2016-10135?

    CVE-2016-10135 affects LG devices using MTK chipsets running Android versions 5.0, 5.1, 6.0, 6.0.1, and 7.0, as well as RCA Voyager Tablet and certain BLU devices.

  • What are the potential risks associated with CVE-2016-10135?

    The main risk associated with CVE-2016-10135 is unauthorized access to sensitive information due to the exposed MTKLogger application components.

  • Is there a workaround for CVE-2016-10135?

    There is no known workaround for CVE-2016-10135, and users are advised to update their devices to mitigate the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203