Vulnerabilities > CVE-2016-10137 - Cryptographic Issues vulnerability in Adups Fota
Summary
An issue was discovered on BLU R1 HD devices with Shanghai Adups software. The content provider named com.adups.fota.sysoper.provider.InfoProvider in the app with a package name of com.adups.fota.sysoper allows any app on the device to read, write, and delete files as the system user. In the com.adups.fota.sysoper app's AndroidManifest.xml file, it sets the android:sharedUserId attribute to a value of android.uid.system which makes it execute as the system user, which is a very privileged user on the device. This allows a third-party app to read, write, and delete the user's sent and received text messages and call log. This allows a third-party app to obtain PII from the user without permission to do so.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Signature Spoofing by Key Recreation An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
References
- http://www.securityfocus.com/bid/96852
- http://www.securityfocus.com/bid/96852
- https://www.kryptowire.com/adups_security_analysis.html
- https://www.kryptowire.com/adups_security_analysis.html
- https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html
- https://www.nytimes.com/2016/11/16/us/politics/china-phones-software-security.html