First published: Wed Aug 29 2018(Updated: )
The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel A30 Firmware | =7.0 | |
Alcatel A30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.