CVE-2018-6597
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/08/2018
Last modified:
03/10/2019
Description
The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:alcatel:a30_firmware:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:alcatel:a30:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



