Description
An improper authentication vulnerability was discovered in the Motorola Factory Test component (com.motorola.motocit). The application contained a reference to a writable file descriptor in external storage which could be used by third party apps running on the device to open a TCP server, exposing sensitive permissions and data. This could allow a local attacker to bypass permission checks and access protected device settings.
Published: 2026-05-19
Score: 8.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An improper authentication flaw in Motorola’s Factory Test component (com.motorola.motocit) allows a local threat actor to bypass device permission checks. By exploiting the reference to a writable file descriptor in external storage, a third‑party application on the device can open a TCP server that exposes sensitive permissions and data. The vulnerability effectively grants the attacker elevated access to protected device settings and related information without needing legitimate credential verification.

Affected Systems

Motorola mobile phones that include the Factory Test component. No specific firmware version ranges are listed, so the issue applies to any device running software that contains the affected com.motorola.motocit implementation.

Risk and Exploitability

The CVSS score of 8.4 indicates a severe risk. EPSS data is not available, but the vulnerability is not listed in CISA KEV, suggesting no public exploit evidence yet. The only attack vector is local, requiring the attacker to have physical or regular user access to the device and the ability to install or run a third‑party app. Once executed, the attacker can establish a network service that leaks privileged information and can manipulate protected settings.

Generated by OpenCVE AI on May 19, 2026 at 16:20 UTC.

Remediation

Vendor Solution

Update your Motorola Phone to software versions with a Security Patch Level of 2026-04-05 or later.


OpenCVE Recommended Actions

  • Apply the Motorola software update with a Security Patch Level of 2026‑04‑05 or later
  • Limit installation of third‑party applications that request network permissions if they are not required
  • Remove or disable the Factory Test component when possible to eliminate the vulnerable code

Generated by OpenCVE AI on May 19, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 16:45:00 +0000

Type Values Removed Values Added
Title Local Permission Escalation via Factory Test Component
Weaknesses CWE-284

Tue, 19 May 2026 15:45:00 +0000

Type Values Removed Values Added
Description An improper authentication vulnerability was discovered in the Motorola Factory Test component (com.motorola.motocit). The application contained a reference to a writable file descriptor in external storage which could be used by third party apps running on the device to open a TCP server, exposing sensitive permissions and data. This could allow a local attacker to bypass permission checks and access protected device settings.
First Time appeared Motorola
Motorola phones
CPEs cpe:2.3:a:motorola:phones:*:*:*:*:*:*:*:*
Vendors & Products Motorola
Motorola phones
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}

cvssV4_0

{'score': 8.4, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: lenovo

Published:

Updated: 2026-05-19T16:39:42.750Z

Reserved: 2026-04-08T14:38:14.415Z

Link: CVE-2026-5804

cve-icon Vulnrichment

Updated: 2026-05-19T16:38:20.549Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T16:16:22.413

Modified: 2026-05-19T17:57:25.143

Link: CVE-2026-5804

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T18:00:12Z

Weaknesses