CVE-2023-44128 (GCVE-0-2023-44128)
Vulnerability from cvelistv5 – Published: 2023-09-27 14:08 – Updated: 2024-09-20 19:45
VLAI?
Summary
he vulnerability is to delete arbitrary files in LGInstallService ("com.lge.lginstallservies") app. The app contains the exported "com.lge.lginstallservies.InstallService" service that exposes an AIDL interface. All its "installPackage*" methods are finally calling the "installPackageVerify()" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted.
Severity ?
5 (Medium)
CWE
- CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| LG Electronics | LG V60 Thin Q 5G(LMV600VM) |
Affected:
Android 4 , ≤ 13
(Android)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:59:50.897Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lgsecurity.lge.com/bulletins/mobile#updateDetails"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-44128",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-20T18:09:46.318108Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-20T19:45:38.716Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "LG V60 Thin Q 5G(LMV600VM)",
"vendor": "LG Electronics",
"versions": [
{
"lessThanOrEqual": "13",
"status": "affected",
"version": "Android 4",
"versionType": "Android"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "he vulnerability is to delete arbitrary files in LGInstallService (\"com.lge.lginstallservies\") app. The app contains the exported \"com.lge.lginstallservies.InstallService\" service that exposes an AIDL interface. All its \"installPackage*\" methods are finally calling the \"installPackageVerify()\" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted."
}
],
"value": "he vulnerability is to delete arbitrary files in LGInstallService (\"com.lge.lginstallservies\") app. The app contains the exported \"com.lge.lginstallservies.InstallService\" service that exposes an AIDL interface. All its \"installPackage*\" methods are finally calling the \"installPackageVerify()\" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted."
}
],
"impacts": [
{
"capecId": "CAPEC-29",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-27T14:13:34.358Z",
"orgId": "42f21055-226c-4bce-a3c8-ecf55a3551fb",
"shortName": "LGE"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://lgsecurity.lge.com/bulletins/mobile#updateDetails"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "LGInstallService - Deletion of arbitrary files with system privilege",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "42f21055-226c-4bce-a3c8-ecf55a3551fb",
"assignerShortName": "LGE",
"cveId": "CVE-2023-44128",
"datePublished": "2023-09-27T14:08:51.040Z",
"dateReserved": "2023-09-26T05:57:13.719Z",
"dateUpdated": "2024-09-20T19:45:38.716Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.0\", \"versionEndIncluding\": \"13.0\", \"matchCriteriaId\": \"5D92B47F-F5BA-4C09-A194-4FE2D23CE28D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:lg:v60_thin_q_5g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85B3B7D2-762E-4DD5-90F9-5246907748C4\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"he vulnerability is to delete arbitrary files in LGInstallService (\\\"com.lge.lginstallservies\\\") app. The app contains the exported \\\"com.lge.lginstallservies.InstallService\\\" service that exposes an AIDL interface. All its \\\"installPackage*\\\" methods are finally calling the \\\"installPackageVerify()\\\" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted.\"}, {\"lang\": \"es\", \"value\": \"La vulnerabilidad consiste en eliminar archivos arbitrarios en la aplicaci\\u00f3n LGInstallService (\\\"com.lge.lginstallservies\\\"). La aplicaci\\u00f3n contiene el servicio \\\"com.lge.lginstallservies.InstallService\\\" exportado que expone una interfaz AIDL. Todos sus m\\u00e9todos \\\"installPackage*\\\" finalmente llaman al m\\u00e9todo \\\"installPackageVerify()\\\" que realiza la validaci\\u00f3n de la firma despu\\u00e9s del m\\u00e9todo de eliminaci\\u00f3n del archivo. Un atacante puede controlar las condiciones para que esta verificaci\\u00f3n de seguridad nunca se realice y se elimine un archivo controlado por el atacante.\"}]",
"id": "CVE-2023-44128",
"lastModified": "2024-11-21T08:25:18.250",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"product.security@lge.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L\", \"baseScore\": 5.0, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 2.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L\", \"baseScore\": 3.6, \"baseSeverity\": \"LOW\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 2.5}]}",
"published": "2023-09-27T15:19:37.217",
"references": "[{\"url\": \"https://lgsecurity.lge.com/bulletins/mobile#updateDetails\", \"source\": \"product.security@lge.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lgsecurity.lge.com/bulletins/mobile#updateDetails\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "product.security@lge.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"product.security@lge.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-367\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-367\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-44128\",\"sourceIdentifier\":\"product.security@lge.com\",\"published\":\"2023-09-27T15:19:37.217\",\"lastModified\":\"2024-11-21T08:25:18.250\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"he vulnerability is to delete arbitrary files in LGInstallService (\\\"com.lge.lginstallservies\\\") app. The app contains the exported \\\"com.lge.lginstallservies.InstallService\\\" service that exposes an AIDL interface. All its \\\"installPackage*\\\" methods are finally calling the \\\"installPackageVerify()\\\" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted.\"},{\"lang\":\"es\",\"value\":\"La vulnerabilidad consiste en eliminar archivos arbitrarios en la aplicaci\u00f3n LGInstallService (\\\"com.lge.lginstallservies\\\"). La aplicaci\u00f3n contiene el servicio \\\"com.lge.lginstallservies.InstallService\\\" exportado que expone una interfaz AIDL. Todos sus m\u00e9todos \\\"installPackage*\\\" finalmente llaman al m\u00e9todo \\\"installPackageVerify()\\\" que realiza la validaci\u00f3n de la firma despu\u00e9s del m\u00e9todo de eliminaci\u00f3n del archivo. Un atacante puede controlar las condiciones para que esta verificaci\u00f3n de seguridad nunca se realice y se elimine un archivo controlado por el atacante.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"product.security@lge.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L\",\"baseScore\":5.0,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":2.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L\",\"baseScore\":3.6,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.0,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"product.security@lge.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndIncluding\":\"13.0\",\"matchCriteriaId\":\"5D92B47F-F5BA-4C09-A194-4FE2D23CE28D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:lg:v60_thin_q_5g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B3B7D2-762E-4DD5-90F9-5246907748C4\"}]}]}],\"references\":[{\"url\":\"https://lgsecurity.lge.com/bulletins/mobile#updateDetails\",\"source\":\"product.security@lge.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lgsecurity.lge.com/bulletins/mobile#updateDetails\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://lgsecurity.lge.com/bulletins/mobile#updateDetails\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T19:59:50.897Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-44128\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-20T18:09:46.318108Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-20T19:44:25.646Z\"}}], \"cna\": {\"title\": \"LGInstallService - Deletion of arbitrary files with system privilege\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-29\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"LG Electronics\", \"product\": \"LG V60 Thin Q 5G(LMV600VM)\", \"versions\": [{\"status\": \"affected\", \"version\": \"Android 4\", \"versionType\": \"Android\", \"lessThanOrEqual\": \"13\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lgsecurity.lge.com/bulletins/mobile#updateDetails\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"he vulnerability is to delete arbitrary files in LGInstallService (\\\"com.lge.lginstallservies\\\") app. The app contains the exported \\\"com.lge.lginstallservies.InstallService\\\" service that exposes an AIDL interface. All its \\\"installPackage*\\\" methods are finally calling the \\\"installPackageVerify()\\\" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"he vulnerability is to delete arbitrary files in LGInstallService (\\\"com.lge.lginstallservies\\\") app. The app contains the exported \\\"com.lge.lginstallservies.InstallService\\\" service that exposes an AIDL interface. All its \\\"installPackage*\\\" methods are finally calling the \\\"installPackageVerify()\\\" method that performs signature validation after the delete file method. An attacker can control conditions so this security check is never performed and an attacker-controlled file is deleted.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-367\", \"description\": \"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition\"}]}], \"providerMetadata\": {\"orgId\": \"42f21055-226c-4bce-a3c8-ecf55a3551fb\", \"shortName\": \"LGE\", \"dateUpdated\": \"2023-09-27T14:13:34.358Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-44128\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-20T19:45:38.716Z\", \"dateReserved\": \"2023-09-26T05:57:13.719Z\", \"assignerOrgId\": \"42f21055-226c-4bce-a3c8-ecf55a3551fb\", \"datePublished\": \"2023-09-27T14:08:51.040Z\", \"assignerShortName\": \"LGE\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…