Lucene search

K
cve[email protected]CVE-2023-46139
HistoryOct 31, 2023 - 12:15 a.m.

CVE-2023-46139

2023-10-3100:15:10
CWE-863
web.nvd.nist.gov
9
cve
2023
46139
kernelsu
android
root solution
malware
signature verification
vulnerability
nvd
security
update
workaround

5.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

5.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.1%

KernelSU is a Kernel based root solution for Android. Starting in version 0.6.1 and prior to version 0.7.0, if a KernelSU installed device is infected with a malware whose app signing block specially constructed, it can take over root privileges on the device. The vulnerable verification logic actually obtains the signature of the last block with an id of 0x7109871a, while the verification logic during Android installation is to obtain the first one. In addition to the actual signature upgrade that has been fixed (KSU thought it was V2 but was actually V3), there is also the problem of actual signature downgrading (KSU thought it was V2 but was actually V1). Find a condition in the signature verification logic that will cause the signature not to be found error, and KernelSU does not implement the same conditions, so KSU thinks there is a V2 signature, but the APK signature verification actually uses the V1 signature. This issue is fixed in version 0.7.0. As workarounds, keep the KernelSU manager installed and avoid installing unknown apps.

Affected configurations

Vulners
NVD
Node
tiannkernelsuRange0.6.10.7.0
CPENameOperatorVersion
kernelsu:kernelsukernelsult0.7.0

CNA Affected

[
  {
    "vendor": "tiann",
    "product": "KernelSU",
    "versions": [
      {
        "version": ">= 0.6.1, < 0.7.0",
        "status": "affected"
      }
    ]
  }
]

5.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L

5.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.1%

Related for CVE-2023-46139