Lucene search

K
attackerkbAttackerKBAKB:15D712CE-A4AB-4866-8B72-833181AF8747
HistoryMar 27, 2017 - 12:00 a.m.

CVE-2016-10225

2017-03-2700:00:00
attackerkb.com
15

EPSS

0.001

Percentile

21.0%

The sunxi-debug driver in Allwinner 3.4 legacy kernel for H3, A83T and H8 devices allows local users to gain root privileges by sending “rootmydevice” to /proc/sunxi_debug/sunxi_debug.

Recent assessments:

h00die at March 24, 2020 11:24pm UTC reported:

This vulnerability is unbelievably easy to trigger. The binary/process sunxi_debug was accidentally incorporated into kernel builds for Allwinner processors. Simply echoing ‘rootmydevice’ to the process /proc/sunxi_debug/sunxi_debug would elevate the shell to root. Beyond simple, trivial to code, absolutely safe from crashing the device.
There were a few issues though. These devices tend to be cheap and/or obscure such as Dragon Android tablets and Orange Pi thus unlikely to be in non-BYOD enterprise environments. The Android tables also incorporate sandboxing which prevented an app from sending the command to the process.

Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 5

EPSS

0.001

Percentile

21.0%

Related for AKB:15D712CE-A4AB-4866-8B72-833181AF8747