Google Android prior 2016-07-05 on Nexus 5 Qualcomm app/aboot/aboot.c access control
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.6 | $5k-$25k | 0.00 |
A vulnerability, which was classified as critical, has been found in Google Android on Nexus 5 (Smartphone Operating System). Affected by this issue is an unknown functionality of the file app/aboot/aboot.c of the component Qualcomm. The manipulation with an unknown input leads to a access control vulnerability. Using CWE to declare the problem leads to CWE-264. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Integer overflow in app/aboot/aboot.c in the Qualcomm components in Android before 2016-07-05 on Nexus 5 devices allows attackers to bypass intended access restrictions via a crafted block count and block size of a sparse header, aka Android internal bug 28822465 and Qualcomm internal bug CR813933.
The weakness was disclosed 07/06/2016 as Android Security Bulletin - July 2016 as confirmed security bulletin (Website). The advisory is available at source.android.com. This vulnerability is handled as CVE-2015-8888 since 05/31/2016. The exploitation is known to be easy. Local access is required to approach this attack. The successful exploitation needs a simple authentication. Successful exploitation requires user interaction by the victim. Technical details are known, but there is no available exploit. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 09/01/2022). It is expected to see the exploit prices for this product increasing in the near future.This vulnerability is assigned to T1068 by the MITRE ATT&CK project.
Upgrading to version 2016-07-05 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The entries 88897, 88898, 88899 and 88900 are pretty similar.
Product
Type
Vendor
Name
Version
- 0.c
- 1.0
- 1.1
- 1.2
- 1.3
- 1.4
- 1.5
- 1.6
- 1.c
- 2.0
- 2.0.1
- 2.1
- 2.2
- 2.2.1
- 2.2.2
- 2.2.3
- 2.3
- 2.3.1
- 2.3.2
- 2.3.3
- 2.3.4
- 2.3.5
- 2.3.6
- 2.3.7
- 2.37
- 2.c
- 2.java
- 3.0
- 3.1
- 3.2
- 3.2.1
- 3.2.2
- 3.2.3
- 3.2.4
- 3.2.5
- 3.2.6
- 3.8
- 3.10
- 3.15-rc5-next-20140519
- 3.18
- 4
- 4.0
- 4.0.1
- 4.0.2
- 4.0.3
- 4.0.4
- 4.1
- 4.1.1
- 4.1.2
- 4.2
- 4.2.1
- 4.2.2
- 4.3
- 4.3.1
- 4.4
- 4.4.1
- 4.4.1_r1
- 4.4.2
- 4.4.3
- 4.4.4
- 4.9
- 4.14 LTS
- 4.cpp
- 5
- 5.0
- 5.0.1
- 5.0.2
- 5.1
- 5.1.1
- 5.1.1 LMY48X
- 5.1.1 LMY48Z
- 5.1.1 LMY49C
- 5.1.1 LMY49F
- 5.2
- 6.0
- 6.0 2015-10-01
- 6.0 2015-10-01
- 6.0 2015-11-01
- 6.0 2015-12-01
- 6.0 2015-1201
- 6.0 2016-01-01
- 6.0 2016-06-01
- 6.0 2016-07-01
- 6.0 2016-07-05
- 6.0 Security Patch Level 11-01-2015
- 6.0.1
- 6.1
- 6.cpp
- 7.0
- 7.1
- 7.1.1
- 7.1.2
- 8.
- 8.0
- 8.1
- 9
- 9.0
- 10
- 10.0
- 11
- 11.0
- 12
- 12.0
- 12L
- 13
- 13.0
- 14
- 18.0.1
- 101.c
- 1012
- 2013-01-16
- 2013-07-07
- 2016-06-01
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.8VulDB Meta Temp Score: 7.6
VulDB Base Score: 7.8
VulDB Temp Score: 7.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.8
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Android 2016-07-05
Patch: source.codeaurora.org
Timeline
05/31/2016 🔍07/06/2016 🔍
07/06/2016 🔍
07/07/2016 🔍
07/10/2016 🔍
07/11/2016 🔍
09/01/2022 🔍
Sources
Vendor: google.comAdvisory: Android Security Bulletin - July 2016
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2015-8888 (🔍)
SecurityFocus: 91628 - Google Nexus Qualcomm Components Multiple Privilege Escalation Vulnerabilities
scip Labs: https://www.scip.ch/en/?labs.20150917
See also: 🔍
Entry
Created: 07/11/2016 11:01Updated: 09/01/2022 12:00
Changes: 07/11/2016 11:01 (59), 02/21/2019 14:06 (12), 09/01/2022 12:00 (4)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.