Sunday, April 13, 2025
HomeCVE/vulnerabilityLenovo VIBE Mobile Phones Vulnerable to Local Root Privilege Escalation -...

Lenovo VIBE Mobile Phones Vulnerable to Local Root Privilege Escalation – Its Time to Update your Lenovo Smart Phones

Published on

SIEM as a Service

Follow Us on Google News

A Critical Vulnerabilities Discovered in Lenovo Vibe Android Mobiles Phones which leads to Local Privilege Escalation to the Victims device that is not protected with a secure lock screen.

It helps to Escalate the root Access  “Jail Breaking” and it leads to change the Device operations and devices Core Functionalities.

This Critical vulnerability  Presented in Lenovo products with an Android OS version earlier than Android Marshmallow 6.0 may be vulnerable to the root exploit.

- Advertisement - Google News

Lenovo Devices that have been upgraded to Marshmallow 6.0 is not Affected.

According to Lenovo, these are the 3 Critical Vulnerabilities, leads to Escalate the Local Privilege.

1. CVE-2017-3748

Improper access controls on the nac_server component can be abused in conjunction with CVE-2017-3749 and CVE-2017-3750 to elevate privileges to the root user (commonly known as ‘rooting’ or “jail breaking” a device).

2. CVE-2017-3749

The Idea Friend Android application allows private data to be backed up and restored via Android Debug Bridge, which allows tampering leading to privilege escalation in conjunction with CVE-2017-3748 and CVE-2017-3750

3. CVE-2017-3750 

The Lenovo Security Android application allows private data to be backed up and restored via Android Debug Bridge, which allows tampering leading to privilege escalation in conjunction with CVE-2017-3748

Recommendations for Protect Yourself

Lenovo Highly Recommanded to  users ,“Do not Jailbreak” their Smart Phones which cause escalate the Privileges easily.

Users on older Android releases (earlier than Android 6.0 Marshmallow) are advised to take the following actions:

1)  If you have enabled the Android Developer Options menu on your device (uncommon), disable ADB when not in use

2)  Enable lock screen authentication mechanisms; e.g. PIN/Password protection

3) If updates are available, follow the prompts to install.

Devices not impacted as they have already been upgraded:

A5860

A7010a48

A7020a40

A7020a48

K50-t3s

K50-t5

K51c78

K52e78

P1c58

P1c72

X3a40

X3c50

X3c70

Z90-3

Z90-7

Devices impacted on Android Lollipop that have been patched include:

A2010-a

A2010-l

A2020a40

A2580

A3580

A3690

A3860(t-3)

A3860(ts-3)

A3890

A3910e70

A3910t30

A5600

A5890

A6020a40

A6020a41

A6020a46

A6020i36

A7600

A7600-m

K31-t3-s

K32c36

K52t38

K920

P1ma40

S1La40

Affected products with no fix available:

(refer to the “Mitigation Strategy for Customers” section above)

A1600

A2560

A2800

A2860

A2880

A3000

A3500

A3600-d

A3600u

A3800-d

A3900

A6000

A6000-I

A6600

A6020i37

A6800

K30-E

K30-W-cu

K32c30

K80M

To read Full  Technical Analysis please visit here

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

CISA Issues 10 ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued ten new Industrial Control Systems...

AMD CPU Signature Verification Vulnerability Enables Unauthorized Microcode Execution

A vulnerability in AMD CPUs has been uncovered, enabling attackers with administrative privileges to...

Ivanti 0-Day RCE Flaw Exploitation Details Revealed

A critical unauthenticated Remote Code Execution (RCE) vulnerability, CVE-2025-22457, has been disclosed by Ivanti, sparking concerns across...