Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-15027
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-14 Aug, 2019 | 13:15
Updated At-24 Aug, 2020 | 17:37

The MediaTek Embedded Multimedia Card (eMMC) subsystem for Android on MT65xx, MT66xx, and MT8163 SoC devices allows attackers to execute arbitrary commands as root via shell metacharacters in a filename under /data, because clear_emmc_nomedia_entry in platform/mt6577/external/meta/emmc/meta_clr_emmc.c invokes 'system("/system/bin/rm -r /data/' followed by this filename upon an eMMC clearance from a Meta Mode boot. NOTE: compromise of Fire OS on the Amazon Echo Dot would require a second hypothetical vulnerability that allows creation of the required file under /data.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.09.8CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

MediaTek Inc.
mediatek
>>mt8163_firmware>>-
cpe:2.3:o:mediatek:mt8163_firmware:-:*:*:*:*:android:*:*
MediaTek Inc.
mediatek
>>mt8163>>-
cpe:2.3:h:mediatek:mt8163:-:*:*:*:*:android:*:*
MediaTek Inc.
mediatek
>>mt6625_firmware>>-
cpe:2.3:o:mediatek:mt6625_firmware:-:*:*:*:*:android:*:*
MediaTek Inc.
mediatek
>>mt6625>>-
cpe:2.3:h:mediatek:mt6625:-:*:*:*:*:android:*:*
MediaTek Inc.
mediatek
>>mt6577_firmware>>-
cpe:2.3:o:mediatek:mt6577_firmware:-:*:*:*:*:android:*:*
MediaTek Inc.
mediatek
>>mt6577>>-
cpe:2.3:h:mediatek:mt6577:-:*:*:*:*:android:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://dojo.bullguard.com/dojo-by-bullguard/blog/gaining-rooting-primitives-for-android-mediatek-chips/cve@mitre.org
Exploit
Third Party Advisory
https://github.com/andr3jx/MTK6577/blob/238012ebf18e3751397884d1742ff7ab6417e80d/mediatek/platform/mt6577/external/meta/emmc/meta_clr_emmc.c#L302-L305cve@mitre.org
Third Party Advisory
Change History
0Changes found

Details not found