First published: Thu Nov 14 2019(Updated: )
The Doogee Mix Android device with a build fingerprint of DOOGEE/MIX/MIX:7.0/NRD90M/1495809471:user/release-keys contains a pre-installed app with a package name of com.mediatek.factorymode app (versionCode=1, versionName=1) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Doogee Mix Firmware | ||
Doogee Mix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-15422.
The severity of CVE-2019-15422 is low with a severity value of 3.3.
The affected software of CVE-2019-15422 is Doogee Mix Firmware.
CVE-2019-15422 allows unauthorized wireless settings modification through a pre-installed app with a package name of com.mediatek.factorymode.
No, Doogee Mix is not vulnerable to CVE-2019-15422.