Lucene search

K
prionPRIOn knowledge basePRION:CVE-2018-6597
HistoryAug 29, 2018 - 7:29 p.m.

Privilege escalation

2018-08-2919:29:00
PRIOn knowledge base
www.prio-n.com
5

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.1%

The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).

CPENameOperatorVersion
a30_firmwareeq7.0

7.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.1%

Related for PRION:CVE-2018-6597