Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15002

EPSS 0.06% · P18
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-15002

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Vivo V7 device with a build fingerprint of vivo/1718/1718:7.1.2/N2G47H/compil11021857:user/release-keys allows any app co-located on the device to set system properties as the com.android.phone user. The com.qualcomm.qti.modemtestmode app (versionCode=25, versionName=7.1.2) that contains an exported service named com.qualcomm.qti.modemtestmode.MbnTestService that allows any app co-located on the device to provide key-value pairs to set certain system properties. Notably, system properties with the persist.* prefix can be set which will survive a reboot. On the Vivo V7 device, when the persist.sys.input.log property is set to have a value of yes, the user's screen touches be written to the logcat log by the InputDispatcher for all apps. The system-wide logcat log can be obtained from external storage via a different known vulnerability on the device. The READ_EXTERNAL_STORAGE permission is necessary to access the log files containing the user's touch coordinates. With some effort, the user's touch coordinates can be mapped to key presses on a keyboard.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vivo V7 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vivo V7是中国维沃(Vivo)移动通信公司的一款智能手机。 Vivo V7(所使用的Build fingerprint为vivo/1718/1718:7.1.2/N2G47H/compil11021857:user/release-keys)中的com.qualcomm.qti.modemtestmode app的com.qualcomm.qti.modemtestmode.MbnTestService应用程序组件存在安全漏洞。攻击者可利用该漏洞以com.android.phone用户身份设置系统属
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-15002

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-15002

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-12-28 · 76 CVEs total

CVE-2018-20574yaml-cpp 缓冲区错误漏洞
CVE-2018-14992ASUS ZenFone 3 Max 安全特征问题漏洞
CVE-2018-18696Microstrategy Analytics 跨站请求伪造漏洞
CVE-2018-18667Pylon(PYLNT)数字错误漏洞
CVE-2018-18666SwftCoin 数字错误漏洞
CVE-2018-18665Nexxus 数字错误漏洞
CVE-2018-16638Evolution CMS 跨站脚本漏洞
CVE-2018-16637Evolution CMS 跨站脚本漏洞
CVE-2018-16632Mezzanine CMS 跨站脚本漏洞
CVE-2018-16630Kirby 跨站脚本漏洞
CVE-2018-20575Orange Livebox 安全漏洞
CVE-2018-20573yaml-cpp 缓冲区错误漏洞
CVE-2018-20572WUZHI CMS SQL注入漏洞
CVE-2018-20571DamiCMS 安全漏洞
CVE-2018-20570JasPer 缓冲区错误漏洞
CVE-2018-20569Ivan Cordoba Generic Content Management System SQL注入漏洞
CVE-2018-20568Ivan Cordoba Generic Content Management System SQL注入漏洞
CVE-2018-20567DouCo DouPHP 安全漏洞
CVE-2018-20566DouCo DouPHP 安全漏洞
CVE-2018-20565DouCo DouPHP 跨站脚本漏洞

Showing top 20 of 76 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-15002

No comments yet


Leave a comment