CVE-2019-16241
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/11/2019
Last modified:
24/08/2020
Description
On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, PIN authentication can be bypassed by creating a special file within the /data/local/tmp/ directory. The System application that implements the lock screen checks for the existence of a specific file and disables PIN authentication if it exists. This file would typically be created via Android Debug Bridge (adb) over USB.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:alcatelmobile:cingular_flip_2_firmware:b9huah1:*:*:*:*:*:*:* | ||
| cpe:2.3:h:alcatelmobile:cingularl_flip_2:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



