The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2018-08-29T19:00:00
Updated: 2024-08-05T06:10:10.415Z
Reserved: 2018-02-03T00:00:00
Link: CVE-2018-6597
Vulnrichment
No data.
NVD
Status : Modified
Published: 2018-08-29T19:29:01.047
Modified: 2024-11-21T04:10:58.190
Link: CVE-2018-6597
Redhat
No data.