Overview
Ragentek Android software contains an over-the-air update mechanism that communicates over an unencrypted channel, which can allow a remote attacker to execute arbitrary code with root privileges.
Description
CWE-494: Download of Code Without Integrity Check - CVE-2016-6564 Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks.
Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary:
Host: 114.80.68.223 Connection: Close An example response from the server could be:
{"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}}
|
Impact
An remote, unauthenticated attacker in a position to perform man-in-the-middle attacks can execute arbitrary commands as root. |
Solution
Apply an update |
Avoid use of untrusted networks |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 8.4 | E:POC/RL:ND/RC:C |
Environmental | 6.3 | CDP:N/TD:M/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to Dan Dahlberg and Tiago Pereira of BitSight Technologies and Anubis Networks for reporting this vulnerability.
This document was written by Trent Novelly.
Other Information
CVE IDs: | CVE-2016-6564 |
Date Public: | 2016-11-11 |
Date First Published: | 2016-11-17 |
Date Last Updated: | 2016-11-17 21:49 UTC |
Document Revision: | 21 |