Security researchers have uncovered several critical vulnerabilities in applications preloaded on Ulefone and Krüger&Matz Android smartphones. These flaws, reported by CERT Polska, expose users to significant risks, including potential data theft and device manipulation by malicious applications. In specific, third party app installed on the same device could by misusing these vulnerabilities without authentication perform factory reset of device, exfiltrate PIN code and inject an arbitrary intent with system-level privileges.
Here’s a breakdown of the three specific vulnerabilities:
com.pri.factorytest
application, which is preloaded on Android smartphones from vendors like Ulefone and Krüger&Matz during the manufacturing process.com.pri.factorytest.emmc.FactoryResetService
.com.pri.applock
application, preloaded on Krüger&Matz smartphones, which is designed to encrypt other applications using a PIN or biometric data.com.android.providers.settings.fingerprint.PriFpShareProvider
.query()
, allows any other malicious application, without needing any specific Android system permissions, to exfiltrate (steal) the user’s PIN code.query()
method com.pri.applock
application on Krüger&Matz smartphones, this vulnerability involves an exposed activity called com.pri.applock.LockUI
.Two vulnerabilities described above are relate to CWE-926: Improper Export of Android Application Components. This is a weakness where an Android application exports a component (Activity, Service, or Content Provider) for use by other applications but fails to properly restrict which applications can launch that component or access the data it contains.
There are three main types of Android components that can be improperly exported:
A simple example of exploitation involves an Activity or Service that is intended for internal use or trusted partners but has an intent-filter defined in the AndroidManifest.xml
and does not explicitly set android:exported="false"
. By default, the presence of an intent-filter automatically exports the component. A malicious application could then simply create an Intent matching this filter and launch the exported Activity or start the Service, gaining access to functionality or data it shouldn’t have. Similarly, if a Content Provider is not restricted, another app could use a ContentResolver to query, insert, update, or delete data within that provider, reading or modifying sensitive information.
Here are some publicly disclosed security issues related to Improper Export of Android Application Components, which occurs when Android app components (like Activities, Services, or Content Providers) are exported without proper access restrictions:
Description: The com.mm.android.easy4ip.MainActivity activity within the com.mm.android.smartlifeiot app blindly loads URLs provided through intent data. A malicious third-party app can exploit this oversight to trigger the loading of malicious web content, initiating unauthorized JavaScript web browser mining operations or remote code execution within the WebView.
Impact: An attacker can exploit this vulnerability to:
PoC: Analysis
Description: Improper Export of Android Application Components in AODService prior to version 8.8.28.12 allows local attackers to launch arbitrary activity with systemui privilege.
Issue: The vulnerability allows an unprivileged (untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application itself.
Description: The Advantech TPC-110W HMI is designed to be controlled remotely. This capability is implemented with a specific Android application named Android Agent (package name com.adv.client), preinstalled on the operating system. This application runs with high privileges, to allow a remote administrator to perform specific operations on the device such as enabling the debug interface or remote login through VNC and installing or removing applications.
Source: Bosch Rexroth ctrlX HMI WR21 Browser-based HMI Affected by Multiple Security Flaws
Description: PrinterShare Android application (com.dynamixsoftware.printershare
) allows the capture of Gmail authentication tokens that can be reused to access a user’s Gmail account without proper authorization.
Source: Mobile Dynamix PrinterShare Mobile Print Gmail Oauth Token Disclosure
Description: Improper export of android application components vulnerability in TelephonyUI prior to SMR May-2024 Release 1 allows local attackers to reboot the device without proper permission.
Description: Certain software builds for the BLU View 2 and Sharp Rouvo V Android devices include a pre-installed app (com.evenwell.fqc
) that is vulnerable due to improper access control. The app exposes exported components that can be triggered by any third-party app without requiring special permissions or user interaction.
Impact: This allows attackers to:
Source: Still Vulnerable Out of the Box: Revisiting the Security of Prepaid Android Carrier Devices
To protect applications from CWE-926 vulnerabilities like those found in Ulefone and Krüger&Matz devices, developers should focus on reducing the attack surface. Key mitigation strategies during the Build and Compilation or Architecture and Design phases include:
By following these practices, developers can prevent unauthorized access to their application components and protect user data from malicious applications.