A local Root exploit has been discovered on Lenovo Smartphones

  • 226
  •  
  •  
  •  
  •  
  •  
  •  
    226
    Shares

Security flaws have been discovered on Lenovo VIBE Mobile Phones that enable the hacker or the attacker with physical possession of a device that is not protected with a secure lock screen, such as PIN or Password, to elevate privileges to the root user (commonly known as “rooting” or “jailbreaking” a device) with the capability to change the device’s operation and functionality in myriad ways.

“1. CVE-2017-3748 – Improper access controls on the nac_server component can be abused in conjunction with CVE-2017-3749 and CVE-2017-3750 to elevate privileges to the root user (commonly known as ‘rooting’ or “jail breaking” a device).”

“2. CVE-2017-3749 – The Idea Friend Android application allows private data to be backed up and restored via Android Debug Bridge, which allows tampering leading to privilege escalation in conjunction with CVE-2017-3748 and CVE-2017-3750”

“3. CVE-2017-3750 – The Lenovo Security Android application allows private data to be backed up and restored via Android Debug Bridge, which allows tampering leading to privilege escalation in conjunction with CVE-2017-3748”

The flaws have been discovered by Mandiant’s Red Team in May 2016 and were reported the same month. In charge of Lenovo’s mobile phone portfolio, Motorola has since corrected the vulnerabilities by redesigning “the affected mechanism to use a more secure process,”

“Devices that have been upgraded to Android 6.0 Marshmallow are not affected. Select Lenovo products with an Android OS version earlier than 6.0 may be vulnerable to the root exploit.”

Avatar

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]

Do NOT follow this link or you will be banned from the site!