Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The Leagoo P1 Android device with a build fingerprint of sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys contains the android framework (i.e., system_server) with a package name of android that has been modified by Leagoo or another entity in the supply chain. The system_server process in the core Android package has an exported broadcast receiver that allows any app co-located on the device to programmatically initiate the taking of a screenshot and have the resulting screenshot be written to external storage. The taking of a screenshot is not transparent to the user; the device has a screen animation as the screenshot is taken and there is a notification indicating that a screenshot occurred. If the attacking app also requests the EXPAND_STATUS_BAR permission, it can wake the device up using certain techniques and expand the status bar to take a screenshot of the user's notifications even if the device has an active screen lock. The notifications may contain sensitive data such as text messages used in two-factor authentication. The system_server process that provides this capability cannot be disabled, as it is part of the Android framework. The notification can be removed by a local Denial of Service (DoS) attack to reboot the device.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Leagoo P1 权限许可和访问控制问题漏洞
Vulnerability Description
Leagoo P1是中国领歌科技(Leagoo)公司的一款基于Android平台的智能手机。 Leagoo P1(build fingerprint为sp7731c_1h10_32v4_bird:6.0/MRA58K/android.20170629.214736:user/release-keys)中存在安全漏洞。攻击者可利用该漏洞进行手机截屏,获取信息或移除通知。
CVSS Information
N/A
Vulnerability Type
N/A