{ "schema_version": "1.4.0", "id": "GHSA-g38m-568m-fp7q", "modified": "2022-05-13T01:53:08Z", "published": "2022-05-13T01:53:08Z", "aliases": [ "CVE-2018-6597" ], "details": "The Alcatel A30 device with a build fingerprint of TCL/5046G/MICKEY6US:7.0/NRD90M/J63:user/release-keys contains a hidden privilege escalation capability to achieve command execution as the root user. They have made modifications that allow a user with physical access to the device to obtain a root shell via ADB. Modifying the read-only properties by an app as the system user creates a UNIX domain socket named factory_test that will execute commands as the root user by processes that have privilege to access it (as per the SELinux rules that the vendor controls).", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6597" }, { "type": "WEB", "url": "https://www.kryptowire.com/portal/android-firmware-defcon-2018" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-08-29T19:29:00Z" } }