Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2016-6564

Summary
Assigner-certcc
Assigner Org ID-37e5125f-f79b-445b-8fad-9564f167944b
Published At-13 Jul, 2018 | 20:00
Updated At-06 Aug, 2024 | 01:36
Rejected At-
Credits

Ragentek Android software contains an over-the-air update mechanism that communicates over an unencrypted channel, which can allow a remote attacker to execute arbitrary code with root privileges

Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}} This binary is reported to be present in the following devices: BLU Studio G BLU Studio G Plus BLU Studio 6.0 HD BLU Studio X BLU Studio X Plus BLU Studio C HD Infinix Hot X507 Infinix Hot 2 X510 Infinix Zero X506 Infinix Zero 2 X509 DOOGEE Voyager 2 DG310 LEAGOO Lead 5 LEAGOO Lead 6 LEAGOO Lead 3i LEAGOO Lead 2S LEAGOO Alfa 6 IKU Colorful K45i Beeline Pro 2 XOLO Cube 5.0

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:certcc
Assigner Org ID:37e5125f-f79b-445b-8fad-9564f167944b
Published At:13 Jul, 2018 | 20:00
Updated At:06 Aug, 2024 | 01:36
Rejected At:
▼CVE Numbering Authority (CNA)
Ragentek Android software contains an over-the-air update mechanism that communicates over an unencrypted channel, which can allow a remote attacker to execute arbitrary code with root privileges

Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}} This binary is reported to be present in the following devices: BLU Studio G BLU Studio G Plus BLU Studio 6.0 HD BLU Studio X BLU Studio X Plus BLU Studio C HD Infinix Hot X507 Infinix Hot 2 X510 Infinix Zero X506 Infinix Zero 2 X509 DOOGEE Voyager 2 DG310 LEAGOO Lead 5 LEAGOO Lead 6 LEAGOO Lead 3i LEAGOO Lead 2S LEAGOO Alfa 6 IKU Colorful K45i Beeline Pro 2 XOLO Cube 5.0

Affected Products
Vendor
Ragentek
Product
Android software
Versions

unknown

  • N/A
Problem Types
TypeCWE IDDescription
CWECWE-494CWE-494
Type: CWE
CWE ID: CWE-494
Description: CWE-494
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Thanks to Dan Dahlberg and Tiago Pereira of BitSight Technologies and Anubis Networks for reporting this vulnerability.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.kb.cert.org/vuls/id/624539
third-party-advisory
x_refsource_CERT-VN
https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack
x_refsource_MISC
https://www.securityfocus.com/bid/94393/
vdb-entry
x_refsource_BID
Hyperlink: https://www.kb.cert.org/vuls/id/624539
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack
Resource:
x_refsource_MISC
Hyperlink: https://www.securityfocus.com/bid/94393/
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.kb.cert.org/vuls/id/624539
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack
x_refsource_MISC
x_transferred
https://www.securityfocus.com/bid/94393/
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.kb.cert.org/vuls/id/624539
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.securityfocus.com/bid/94393/
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cret@cert.org
Published At:13 Jul, 2018 | 20:29
Updated At:09 Oct, 2019 | 23:19

Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}} This binary is reported to be present in the following devices: BLU Studio G BLU Studio G Plus BLU Studio 6.0 HD BLU Studio X BLU Studio X Plus BLU Studio C HD Infinix Hot X507 Infinix Hot 2 X510 Infinix Zero X506 Infinix Zero 2 X509 DOOGEE Voyager 2 DG310 LEAGOO Lead 5 LEAGOO Lead 6 LEAGOO Lead 3i LEAGOO Lead 2S LEAGOO Alfa 6 IKU Colorful K45i Beeline Pro 2 XOLO Cube 5.0

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.1HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.0
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

infinixauthority
infinixauthority
>>hot_x507_firmware>>-
cpe:2.3:o:infinixauthority:hot_x507_firmware:-:*:*:*:*:*:*:*
infinixauthority
infinixauthority
>>hot_x507>>-
cpe:2.3:h:infinixauthority:hot_x507:-:*:*:*:*:*:*:*
infinixauthority
infinixauthority
>>hot_2_x510_firmware>>-
cpe:2.3:o:infinixauthority:hot_2_x510_firmware:-:*:*:*:*:*:*:*
infinixauthority
infinixauthority
>>hot_2_x510>>-
cpe:2.3:h:infinixauthority:hot_2_x510:-:*:*:*:*:*:*:*
infinixauthority
infinixauthority
>>zero_x506_firmware>>-
cpe:2.3:o:infinixauthority:zero_x506_firmware:-:*:*:*:*:*:*:*
infinixauthority
infinixauthority
>>zero_x506>>-
cpe:2.3:h:infinixauthority:zero_x506:-:*:*:*:*:*:*:*
infinixauthority
infinixauthority
>>zero_2_x509_firmware>>-
cpe:2.3:o:infinixauthority:zero_2_x509_firmware:-:*:*:*:*:*:*:*
infinixauthority
infinixauthority
>>zero_2_x509>>-
cpe:2.3:h:infinixauthority:zero_2_x509:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_g_firmware>>-
cpe:2.3:o:bluproducts:studio_g_firmware:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_g>>-
cpe:2.3:h:bluproducts:studio_g:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_g_plus_firmware>>-
cpe:2.3:o:bluproducts:studio_g_plus_firmware:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_g_plus>>-
cpe:2.3:h:bluproducts:studio_g_plus:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_6.0_hd_firmware>>-
cpe:2.3:o:bluproducts:studio_6.0_hd_firmware:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_6.0_hd>>-
cpe:2.3:h:bluproducts:studio_6.0_hd:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_x_firmware>>-
cpe:2.3:o:bluproducts:studio_x_firmware:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_x>>-
cpe:2.3:h:bluproducts:studio_x:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_x_plus_firmware>>-
cpe:2.3:o:bluproducts:studio_x_plus_firmware:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_x_plus>>-
cpe:2.3:h:bluproducts:studio_x_plus:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_c_hd_firmware>>-
cpe:2.3:o:bluproducts:studio_c_hd_firmware:-:*:*:*:*:*:*:*
bluproducts
bluproducts
>>studio_c_hd>>-
cpe:2.3:h:bluproducts:studio_c_hd:-:*:*:*:*:*:*:*
xolo
xolo
>>cube_5.0_firmware>>-
cpe:2.3:o:xolo:cube_5.0_firmware:-:*:*:*:*:*:*:*
xolo
xolo
>>cube_5.0>>-
cpe:2.3:h:xolo:cube_5.0:-:*:*:*:*:*:*:*
beeline
beeline
>>pro_2_firmware>>-
cpe:2.3:o:beeline:pro_2_firmware:-:*:*:*:*:*:*:*
beeline
beeline
>>pro_2>>-
cpe:2.3:h:beeline:pro_2:-:*:*:*:*:*:*:*
iku-mobile
iku-mobile
>>colorful_k45i_firmware>>-
cpe:2.3:o:iku-mobile:colorful_k45i_firmware:-:*:*:*:*:*:*:*
iku-mobile
iku-mobile
>>colorful_k45i>>-
cpe:2.3:h:iku-mobile:colorful_k45i:-:*:*:*:*:*:*:*
leagoo
leagoo
>>lead_5_firmware>>-
cpe:2.3:o:leagoo:lead_5_firmware:-:*:*:*:*:*:*:*
leagoo
leagoo
>>lead_5>>-
cpe:2.3:h:leagoo:lead_5:-:*:*:*:*:*:*:*
leagoo
leagoo
>>lead_6_firmware>>-
cpe:2.3:o:leagoo:lead_6_firmware:-:*:*:*:*:*:*:*
leagoo
leagoo
>>lead_6>>-
cpe:2.3:h:leagoo:lead_6:-:*:*:*:*:*:*:*
leagoo
leagoo
>>lead_3i_firmware>>-
cpe:2.3:o:leagoo:lead_3i_firmware:-:*:*:*:*:*:*:*
leagoo
leagoo
>>lead_3i>>-
cpe:2.3:h:leagoo:lead_3i:-:*:*:*:*:*:*:*
leagoo
leagoo
>>lead_2s_firmware>>-
cpe:2.3:o:leagoo:lead_2s_firmware:-:*:*:*:*:*:*:*
leagoo
leagoo
>>lead_2s>>-
cpe:2.3:h:leagoo:lead_2s:-:*:*:*:*:*:*:*
leagoo
leagoo
>>alfa_6_firmware>>-
cpe:2.3:o:leagoo:alfa_6_firmware:-:*:*:*:*:*:*:*
leagoo
leagoo
>>alfa_6>>-
cpe:2.3:h:leagoo:alfa_6:-:*:*:*:*:*:*:*
doogee
doogee
>>voyager_2_dg310i_firmware>>-
cpe:2.3:o:doogee:voyager_2_dg310i_firmware:-:*:*:*:*:*:*:*
doogee
doogee
>>voyager_2_dg310i>>-
cpe:2.3:h:doogee:voyager_2_dg310i:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-264Primarynvd@nist.gov
CWE-494Secondarycret@cert.org
CWE ID: CWE-264
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-494
Type: Secondary
Source: cret@cert.org
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attackcret@cert.org
Exploit
Third Party Advisory
https://www.kb.cert.org/vuls/id/624539cret@cert.org
Third Party Advisory
US Government Resource
https://www.securityfocus.com/bid/94393/cret@cert.org
Third Party Advisory
VDB Entry
Hyperlink: https://www.bitsighttech.com/blog/ragentek-android-ota-update-mechanism-vulnerable-to-mitm-attack
Source: cret@cert.org
Resource:
Exploit
Third Party Advisory
Hyperlink: https://www.kb.cert.org/vuls/id/624539
Source: cret@cert.org
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.securityfocus.com/bid/94393/
Source: cret@cert.org
Resource:
Third Party Advisory
VDB Entry

Change History

0
Information is not available yet

Similar CVEs

11Records found

CVE-2015-1416
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.88% / 75.52%
||
7 Day CHG~0.00%
Published-05 Feb, 2018 | 16:00
Updated-06 Aug, 2024 | 04:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Larry Wall's patch; patch in FreeBSD 10.2-RC1 before 10.2-RC1-p1, 10.2 before 10.2-BETA2-p2, and 10.1 before 10.1-RELEASE-p16; Bitrig; GNU patch before 2.2.5; and possibly other patch variants allow remote attackers to execute arbitrary shell commands via a crafted patch file.

Action-Not Available
Vendor-n/aFreeBSD Foundation
Product-freebsdn/a
CWE ID-CWE-264
Not Available
CVE-2019-2003
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.8||HIGH
EPSS-0.47% / 64.59%
||
7 Day CHG~0.00%
Published-19 Jun, 2019 | 20:05
Updated-04 Aug, 2024 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In addLinks of Linkify.java, there is a possible phishing vector due to an unusual root cause. This could lead to remote code execution or misdirection of clicks with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-116321860

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-264
Not Available
CVE-2013-7202
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-1.33% / 80.15%
||
7 Day CHG~0.00%
Published-27 Apr, 2018 | 16:00
Updated-06 Aug, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WebHybridClient class in PayPal 5.3 and earlier for Android allows remote attackers to execute arbitrary JavaScript on the system.

Action-Not Available
Vendor-paypaln/a
Product-paypaln/a
CWE ID-CWE-264
Not Available
CVE-2019-12728
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.15% / 35.29%
||
7 Day CHG~0.00%
Published-04 Jun, 2019 | 12:41
Updated-04 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Grails before 3.3.10 used cleartext HTTP to resolve the SDKMan notification service. NOTE: users' apps were not resolving dependencies over cleartext HTTP.

Action-Not Available
Vendor-grailsn/a
Product-grailsn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2019-10248
Matching Score-4
Assigner-Eclipse Foundation
ShareView Details
Matching Score-4
Assigner-Eclipse Foundation
CVSS Score-8.1||HIGH
EPSS-0.17% / 37.10%
||
7 Day CHG~0.00%
Published-22 Apr, 2019 | 20:15
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Eclipse Vorto versions prior to 0.11 resolved Maven build artifacts for the Xtext project over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of Vorto might be infected.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-vortoEclipse Vorto
CWE ID-CWE-829
Inclusion of Functionality from Untrusted Control Sphere
CWE ID-CWE-494
Download of Code Without Integrity Check
CWE ID-CWE-669
Incorrect Resource Transfer Between Spheres
CVE-2018-13012
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.1||HIGH
EPSS-0.26% / 49.54%
||
7 Day CHG~0.00%
Published-29 Jun, 2018 | 15:00
Updated-05 Aug, 2024 | 08:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Download of code with improper integrity check in snsupd.exe and upd.exe in SAFE'N'SEC SoftControl/SafenSoft SysWatch, SoftControl/SafenSoft TPSecure, and SoftControl/SafenSoft Enterprise Suite before 4.4.12 allows the remote attacker to execute unauthorized code by substituting a forged update server.

Action-Not Available
Vendor-safensoftn/a
Product-softcontrol_enterprise_suitesoftcontrol_tpsecuresoftcontrol_syswatchn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2020-9759
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.16% / 36.12%
||
7 Day CHG~0.00%
Published-23 Mar, 2020 | 15:36
Updated-17 Sep, 2024 | 03:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
webOS TV Emulator privilege escalation vulnerability

A Vulnerability of LG Electronic web OS TV Emulator could allow an attacker to escalate privileges and overwrite certain files. This vulnerability is due to wrong environment setting. An attacker could exploit this vulnerability through crafted configuration files and executable files.

Action-Not Available
Vendor-n/aLG Electronics Inc.
Product-webosn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2019-1855
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.3||HIGH
EPSS-0.70% / 72.14%
||
7 Day CHG~0.00%
Published-04 Jul, 2019 | 19:50
Updated-20 Nov, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Jabber for Windows DLL Preloading Vulnerability

A vulnerability in the loading mechanism of specific dynamic link libraries in Cisco Jabber for Windows could allow an authenticated, local attacker to perform a DLL preloading attack. To exploit this vulnerability, the attacker would need to have valid credentials on the Windows system. The vulnerability is due to insufficient validation of the resources loaded by the application at run time. An attacker could exploit this vulnerability by crafting a malicious DLL file and placing it in a specific location on the targeted system. The malicious DLL file would execute when the Jabber application launches. A successful exploit could allow the attacker to execute arbitrary code on the target machine with the privileges of another user's account.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-jabberCisco Jabber for Windows
CWE ID-CWE-264
Not Available
CWE ID-CWE-427
Uncontrolled Search Path Element
CVE-2016-10232
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.15%
||
7 Day CHG~0.00%
Published-04 Apr, 2018 | 18:00
Updated-16 Sep, 2024 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability in the Qualcomm video driver. Product: Android. Versions: Android kernel. Android ID: A-34386696. References: QC-CR#1024872.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-264
Not Available
CVE-2017-13083
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.62%
||
7 Day CHG~0.00%
Published-18 Oct, 2017 | 13:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Akeo Consulting Rufus prior to version 2.17.1187 does not adequately validate the integrity of updates downloaded over HTTP, allowing an attacker to easily convince a user to execute arbitrary code

Action-Not Available
Vendor-akeoAkeo Consulting
Product-rufusRufus
CWE ID-CWE-295
Improper Certificate Validation
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2016-10231
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.15%
||
7 Day CHG~0.00%
Published-04 Apr, 2018 | 18:00
Updated-17 Sep, 2024 | 00:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege vulnerability in the Qualcomm sound codec driver. Product: Android. Versions: Android kernel. Android ID: A-33966912. References: QC-CR#1096799.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-264
Not Available
Details not found