Advisory Published
Updated

CVE-2019-15389

First published: Thu Nov 14 2019(Updated: )

The Haier A6 Android device with a build fingerprint of Haier/A6/A6:8.1.0/O11019/1534219877:userdebug/release-keys contains a pre-installed platform app with a package name of com.lovelyfont.defcontainer (versionCode=7, versionName=7.1.13). This app contains an exported service named com.lovelyfont.manager.FontCoverService that allows any app co-located on the device to supply arbitrary commands to be executed as the system user. This app cannot be disabled by the user and the attack can be performed by a zero-permission app. In addition to the local attack surface, its accompanying app with a package name of com.ekesoo.lovelyhifonts makes network requests using HTTP and an attacker can perform a Man-in-the-Middle (MITM) attack on the connection to inject a command in a network response that will be executed as the system user by the com.lovelyfont.defcontainer app. Executing commands as the system user can allow a third-party app to video record the user's screen, factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the Graphical User Interface (GUI), and obtains the user's text messages, and more. Executing commands as the system user can allow a third-party app to factory reset the device, obtain the user's notifications, read the logcat logs, inject events in the GUI, change the default Input Method Editor (IME) (e.g., keyboard) with one contained within the attacking app that contains keylogging functionality, and obtains the user's text messages, and more.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Haier A6 Firmware
Haier A6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2019-15389?

    CVE-2019-15389 has a medium severity rating due to its potential for exploitation through the exposed service.

  • How do I fix CVE-2019-15389?

    To address CVE-2019-15389, update the Haier A6 device to a firmware version that removes the vulnerable app or service.

  • What are the risks associated with CVE-2019-15389?

    The risks of CVE-2019-15389 include unauthorized access to the device and potential data leaks through the exported service.

  • Is my device affected by CVE-2019-15389?

    If you own a Haier A6 device with the specified firmware build, you are affected by CVE-2019-15389.

  • What is the impacted application related to CVE-2019-15389?

    The impacted application linked to CVE-2019-15389 is the pre-installed platform app with the package name com.lovelyfont.defcontainer.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203