Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-39438", "assignerOrgId": "63f92e9c-2193-4c24-98a9-93640392c3d3", "state": "PUBLISHED", "assignerShortName": "Unisoc", "dateReserved": "2024-06-25T06:13:32.360Z", "datePublished": "2024-10-09T06:43:29.015Z", "dateUpdated": "2024-10-09T18:52:15.994Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "63f92e9c-2193-4c24-98a9-93640392c3d3", "shortName": "Unisoc", "dateUpdated": "2024-10-09T06:43:29.015Z"}, "affected": [{"vendor": "Unisoc (Shanghai) Technologies Co., Ltd.", "product": "SC7731E/SC9832E/SC9863A/T310/T606/T612/T616/T610/T618/T760/T770/T820/S8000", "versions": [{"status": "affected", "version": "Android13/Android14"}], "defaultStatus": "unaffected"}], "descriptions": [{"lang": "en", "value": "In linkturbonative service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed."}], "references": [{"url": "https://www.unisoc.com/en_us/secy/announcementDetail/1843898270204624897"}], "metrics": [{"format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}], "cvssV3_1": {"version": "3.1", "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H"}}], "problemTypes": [{"descriptions": [{"lang": "en", "description": "cwe-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')", "type": "CWE"}]}]}, "adp": [{"affected": [{"vendor": "unisoc", "product": "sc7731e", "cpes": ["cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "sc9832e", "cpes": ["cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "sc9863a", "cpes": ["cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t310", "cpes": ["cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t606", "cpes": ["cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t612", "cpes": ["cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t616", "cpes": ["cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t610", "cpes": ["cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t618", "cpes": ["cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t760", "cpes": ["cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t770", "cpes": ["cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "t820", "cpes": ["cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}, {"vendor": "unisoc", "product": "s8000", "cpes": ["cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "android13", "status": "affected"}, {"version": "android14", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-09T18:35:42.803689Z", "id": "CVE-2024-39438", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-09T18:52:15.994Z"}}]}}