Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-14326

EPSS 0.67% · P72
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-14326

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in AndyOS Andy versions up to 46.11.113. By default, it starts telnet and ssh (ports 22 and 23) with root privileges in the emulated Android system. This can be exploited by remote attackers to gain full access to the device, or by malicious apps installed inside the emulator to perform privilege escalation from a normal user to root (unlike with standard methods of getting root privileges on Android - e.g., the SuperSu program - the user is not asked for consent). There is no authentication performed - access to a root shell is given upon a successful connection. NOTE: although this was originally published with a slightly different CVE ID number, the correct ID for this Andy vulnerability has always been CVE-2019-14326.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ANDYOS Andy 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ANDYOS Andy是美国ANDYOS公司的一款Android模拟器。 AndyOS Andy 46.11.113及之前版本中存在安全漏洞。攻击者可借助恶意的应用程序利用该漏洞将权限提升至root。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-14326

#POC DescriptionSource LinkShenlong Link
1Privilege escalation in Andy emulatorhttps://github.com/seqred-s-a/cve-2019-14326POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-14326

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-04-14 · 32 CVEs total

CVE-2020-10381MB CONNECT LINE mymbCONNECT24和mbCONNECT24 SQL注入漏洞
CVE-2020-11739Xen 竞争条件问题漏洞
CVE-2020-11740Xen 信息泄露漏洞
CVE-2020-11741Xen 安全漏洞
CVE-2020-11742Xen 安全漏洞
CVE-2020-11743Xen 安全漏洞
CVE-2020-5738Grandstream GXP1600 后置链接漏洞
CVE-2020-5739Grandstream GXP1600 代码注入漏洞
CVE-2020-9460Octech Oempro 跨站脚本漏洞
CVE-2020-9461Octech Oempro 跨站脚本漏洞
CVE-2020-9004Wowza Media Systems Streaming Engine 访问控制错误漏洞
CVE-2020-7958OnePlus 7 Pro 信息泄露漏洞
CVE-2019-16879Synergy Systems & Solutions HUSKY RTU 6049-E70 访问控制错误漏洞
CVE-2020-7800Synergy Systems & Solutions HUSKY RTU 6049-E70 代码问题漏洞
CVE-2020-7801Synergy Systems & Solutions HUSKY RTU 6049-E70 信息泄露漏洞
CVE-2020-7802Synergy Systems & Solutions HUSKY RTU 6049-E70 安全漏洞
CVE-2020-11758Industrial Light and Magic OpenEXR 缓冲区错误漏洞
CVE-2020-10382MB CONNECT LINE mymbCONNECT24和mbCONNECT24 安全漏洞
CVE-2020-10383MB CONNECT LINE mymbCONNECT24和mbCONNECT24 安全漏洞
CVE-2020-10384MB CONNECT LINE mymbCONNECT24 安全漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-14326

No comments yet


Leave a comment