ID CVE-2019-15470
Summary The Xiaomi Redmi Note 6 Pro Android device with a build fingerprint of xiaomi/tulip/tulip:8.1.0/OPM1.171019.011/V10.2.2.0.OEKMIXM:user/release-keys contains a pre-installed app with a package name of com.qualcomm.qti.callenhancement app (versionCode=27, versionName=8.1.0) that allows other pre-installed apps to perform microphone audio recording via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that export their capabilities to other pre-installed app. This app allows a third-party app to use its open interface to record telephone calls to external storage.
References
Vulnerable Configurations
  • cpe:2.3:o:mi:redmi_note_6_pro_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:mi:redmi_note_6_pro_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:mi:redmi_note_6_pro:-:*:*:*:*:*:*:*
    cpe:2.3:h:mi:redmi_note_6_pro:-:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 24-08-2020 - 17:37)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
refmap via4
misc https://www.kryptowire.com/android-firmware-2019/
Last major update 24-08-2020 - 17:37
Published 14-11-2019 - 17:15
Last modified 24-08-2020 - 17:37
Back to Top