CWE-925
Improper Verification of Intent by Broadcast Receiver
The Android application uses a Broadcast Receiver that receives an Intent but does not properly verify that the Intent came from an authorized source.
CVE-2023-44126 (GCVE-0-2023-44126)
Vulnerability from cvelistv5
- CWE-925 - Improper Verification of Intent by Broadcast Receiver
► | URL | Tags | |||
---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
LG Electronics | LG V60 Thin Q 5G(LMV600VM) |
Version: Android 8 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:59:50.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lgsecurity.lge.com/bulletins/mobile#updateDetails" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-44126", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-20T18:14:28.074499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-20T19:47:59.285Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "LG V60 Thin Q 5G(LMV600VM)", "vendor": "LG Electronics", "versions": [ { "lessThanOrEqual": "13", "status": "affected", "version": "Android 8", "versionType": "Android" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The vulnerability is that the Call management (\"com.android.server.telecom\") app patched by LG sends a lot of LG-owned implicit broadcasts that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as call states, durations, called numbers, contacts info, etc." } ], "value": "The vulnerability is that the Call management (\"com.android.server.telecom\") app patched by LG sends a lot of LG-owned implicit broadcasts that disclose sensitive data to all third-party apps installed on the same device. Those intents include data such as call states, durations, called numbers, contacts info, etc." } ], "impacts": [ { "capecId": "CAPEC-122", "descriptions": [ { "lang": "en", "value": "CAPEC-122 Privilege Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-925", "description": "CWE-925 Improper Verification of Intent by Broadcast Receiver", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-27T14:01:46.084Z", "orgId": "42f21055-226c-4bce-a3c8-ecf55a3551fb", "shortName": "LGE" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lgsecurity.lge.com/bulletins/mobile#updateDetails" } ], "source": { "discovery": "UNKNOWN" }, "title": "Call management - Implicit intents disclose telephony data such as phone numbers, call states, contacts", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "42f21055-226c-4bce-a3c8-ecf55a3551fb", "assignerShortName": "LGE", "cveId": "CVE-2023-44126", "datePublished": "2023-09-27T14:01:46.084Z", "dateReserved": "2023-09-26T05:57:13.719Z", "dateUpdated": "2024-09-20T19:47:59.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-10576 (GCVE-0-2024-10576)
Vulnerability from cvelistv5
- CWE-925 - Improper Verification of Intent by Broadcast Receiver
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Infinix Mobile | com.transsion.agingfunction |
Version: 13 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:infinix_mobile:com.transmission.agingfunction:13:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "com.transmission.agingfunction", "vendor": "infinix_mobile", "versions": [ { "status": "affected", "version": "13" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-10576", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T19:48:36.525706Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T21:01:06.241Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "platforms": [ "Android" ], "product": "com.transsion.agingfunction", "vendor": "Infinix Mobile", "versions": [ { "status": "affected", "version": "13" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Szymon Chadam" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Infinix devices contain a pre-loaded \"com.transsion.agingfunction\" application, that\u0026nbsp;exposes an unsecured broadcast receiver. An attacker can communicate with the receiver and force the device to perform a factory reset without any Android system permissions.\u0026nbsp;\u003cbr\u003e\u003cbr\u003eAfter multiple attempts to contact the vendor we did not receive any answer. We suppose this issue affects all Infinix Mobile devices." } ], "value": "Infinix devices contain a pre-loaded \"com.transsion.agingfunction\" application, that\u00a0exposes an unsecured broadcast receiver. An attacker can communicate with the receiver and force the device to perform a factory reset without any Android system permissions.\u00a0\n\nAfter multiple attempts to contact the vendor we did not receive any answer. We suppose this issue affects all Infinix Mobile devices." } ], "impacts": [ { "capecId": "CAPEC-166", "descriptions": [ { "lang": "en", "value": "CAPEC-166 Force the System to Reset Values" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "IRRECOVERABLE", "Safety": "NEGLIGIBLE", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 9.4, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/R:I/V:D/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-925", "description": "CWE-925 Improper Verification of Intent by Broadcast Receiver", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T12:02:54.241Z", "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "shortName": "CERT-PL" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://cert.pl/en/posts/2024/12/CVE-2024-10576/" }, { "tags": [ "third-party-advisory" ], "url": "https://cert.pl/posts/2024/12/CVE-2024-10576/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unauthorized factory reset of Infinix devices", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6", "assignerShortName": "CERT-PL", "cveId": "CVE-2024-10576", "datePublished": "2024-12-04T12:02:22.601Z", "dateReserved": "2024-10-31T10:16:21.663Z", "dateUpdated": "2024-12-04T21:01:06.241Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation
Phase: Architecture and Design
Description:
- Before acting on the Intent, check the Intent Action to make sure it matches the expected System action.
CAPEC-499: Android Intent Intercept
An adversary, through a previously installed malicious application, intercepts messages from a trusted Android-based application in an attempt to achieve a variety of different objectives including denial of service, information disclosure, and data injection. An implicit intent sent from a trusted application can be received by any application that has declared an appropriate intent filter. If the intent is not protected by a permission that the malicious application lacks, then the attacker can gain access to the data contained within the intent. Further, the intent can be either blocked from reaching the intended destination, or modified and potentially forwarded along.