First published: Wed Aug 29 2018(Updated: )
The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Alcatel A30 | =7.0 | |
Alcatel A30 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6597 has a high severity due to the potential for local privilege escalation leading to root access.
To mitigate CVE-2018-6597, it is recommended to update the Alcatel A30 to the latest firmware version that addresses this vulnerability.
CVE-2018-6597 affects users of the Alcatel A30 device running firmware version 7.0.
Exploitation of CVE-2018-6597 allows an attacker with physical access to obtain root command execution on the device.
Yes, CVE-2018-6597 specifically targets the Alcatel A30 with the specified firmware version.