The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, A83T and H8 devices allows local users to gain root privileges by sending “rootmydevice” to /proc/sunxi_debug/sunxi_debug.
Recent assessments:
h00die at March 24, 2020 11:24pm UTC reported:
This vulnerability is unbelievably easy to trigger. The binary/process sunxi_debug
was accidentally incorporated into kernel builds for Allwinner processors. Simply echoing ‘rootmydevice’ to the process /proc/sunxi_debug/sunxi_debug
would elevate the shell to root. Beyond simple, trivial to code, absolutely safe from crashing the device.
There were a few issues though. These devices tend to be cheap and/or obscure such as Dragon Android tablets and Orange Pi thus unlikely to be in non-BYOD enterprise environments. The Android tables also incorporate sandboxing which prevented an app from sending the command to the process.
Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 5
www.openwall.com/lists/oss-security/2016/10/05/16
www.openwall.com/lists/oss-security/2017/02/15/9
www.securityfocus.com/bid/93442
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10225
forum.armbian.com/index.php?/topic/1108-security-alert-for-allwinner-sun8i-h3a83th8/
irclog.whitequark.org/linux-sunxi/2016-04-29#16314390
www.rapid7.com/db/modules/exploit/multi/local/allwinner_backdoor