Thursday, December 5, 2024
HomeCVE/vulnerabilityLenovo VIBE Mobile Phones Vulnerable to Local Root Privilege Escalation -...

Lenovo VIBE Mobile Phones Vulnerable to Local Root Privilege Escalation – Its Time to Update your Lenovo Smart Phones

Published on

SIEM as a Service

A Critical Vulnerabilities Discovered in Lenovo Vibe Android Mobiles Phones which leads to Local Privilege Escalation to the Victims device that is not protected with a secure lock screen.

It helps to Escalate the root Access  “Jail Breaking” and it leads to change the Device operations and devices Core Functionalities.

This Critical vulnerability  Presented in Lenovo products with an Android OS version earlier than Android Marshmallow 6.0 may be vulnerable to the root exploit.

- Advertisement - SIEM as a Service

Lenovo Devices that have been upgraded to Marshmallow 6.0 is not Affected.

According to Lenovo, these are the 3 Critical Vulnerabilities, leads to Escalate the Local Privilege.

1. CVE-2017-3748

Improper access controls on the nac_server component can be abused in conjunction with CVE-2017-3749 and CVE-2017-3750 to elevate privileges to the root user (commonly known as ‘rooting’ or “jail breaking” a device).

2. CVE-2017-3749

The Idea Friend Android application allows private data to be backed up and restored via Android Debug Bridge, which allows tampering leading to privilege escalation in conjunction with CVE-2017-3748 and CVE-2017-3750

3. CVE-2017-3750 

The Lenovo Security Android application allows private data to be backed up and restored via Android Debug Bridge, which allows tampering leading to privilege escalation in conjunction with CVE-2017-3748

Recommendations for Protect Yourself

Lenovo Highly Recommanded to  users ,“Do not Jailbreak” their Smart Phones which cause escalate the Privileges easily.

Users on older Android releases (earlier than Android 6.0 Marshmallow) are advised to take the following actions:

1)  If you have enabled the Android Developer Options menu on your device (uncommon), disable ADB when not in use

2)  Enable lock screen authentication mechanisms; e.g. PIN/Password protection

3) If updates are available, follow the prompts to install.

Devices not impacted as they have already been upgraded:

A5860

A7010a48

A7020a40

A7020a48

K50-t3s

K50-t5

K51c78

K52e78

P1c58

P1c72

X3a40

X3c50

X3c70

Z90-3

Z90-7

Devices impacted on Android Lollipop that have been patched include:

A2010-a

A2010-l

A2020a40

A2580

A3580

A3690

A3860(t-3)

A3860(ts-3)

A3890

A3910e70

A3910t30

A5600

A5890

A6020a40

A6020a41

A6020a46

A6020i36

A7600

A7600-m

K31-t3-s

K32c36

K52t38

K920

P1ma40

S1La40

Affected products with no fix available:

(refer to the “Mitigation Strategy for Customers” section above)

A1600

A2560

A2800

A2860

A2880

A3000

A3500

A3600-d

A3600u

A3800-d

A3900

A6000

A6000-I

A6600

A6020i37

A6800

K30-E

K30-W-cu

K32c30

K80M

To read Full  Technical Analysis please visit here

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...

Fuji Electric Indonesia Hit by Ransomware Attack

Fuji Electric Indonesia has fallen victim to a ransomware attack, impacting its operations and...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

Thinkware Cloud APK Vulnerability Allows Code Execution With Elevated Privileges

A critical vulnerability identified as CVE-2024–53614 has been discovered in the Thinkware Cloud APK...