The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2018-08-29T19:00:00

Updated: 2024-08-05T06:10:10.415Z

Reserved: 2018-02-03T00:00:00

Link: CVE-2018-6597

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2018-08-29T19:29:01.047

Modified: 2019-10-03T00:03:26.223

Link: CVE-2018-6597

cve-icon Redhat

No data.