Data
Events
Data: CASIE
Negative Trigger
MWR
Labs
researchers
recently disclosed
Vulnerability-related.DiscoverVulnerability
two
high-security
vulnerabilities
in
LG
G3
,
G4
,
and
G5
mobile
devices
.
The
bugs
include
a
Path
Transversal
flaw
and
an
Arbitrary
File
Disclosure
flaw
,
according
to
the
respective
security
advisories
.
The
Path
Transversal
flaw
was
caused
by
the
application
not
validating
that
URL
parameters
did
not
contain
potentially
malicious
characters
and
could
allow
an
attacker
on
the
same
network
as
a
user
to
make
any
media
file
or
folder
shareable
without
authentication
or
user
interaction
.
The
Arbitrary
File
Disclosure
flaw
was
caused
by
the
SmartShare.Cloud
application
launching
an
unauthenticated
HTTP
Server
listening
on
all
interfaces
while
connected
to
a
WiFi
network
and
could
allow
an
attacker
to
retrieve
any
media
file
from
the
Cloud
storage
of
the
victim
as
long
as
they
knew
the
file
name
.
Users
are
encouraged
to
ensure
their
devices
are updated
Vulnerability-related.PatchVulnerability
to
the
latest
versions
as
Version
2.4.0
has
mitigated
Vulnerability-related.PatchVulnerability
the
issues
Researchers
say
Vulnerability-related.DiscoverVulnerability
several
Motorola
handset
models
are vulnerable
Vulnerability-related.DiscoverVulnerability
to
a
critical
kernel
command
line
injection
flaw
that
could
allow
a
local
malicious
application
to
execute
arbitrary
code
on
the
devices
.
The
two
affected
Motorola
models
are
the
Moto
G4
and
Moto
G5
.
The
warnings
Vulnerability-related.DiscoverVulnerability
come
from
Aleph
Research
which
said
Vulnerability-related.DiscoverVulnerability
it
found
Vulnerability-related.DiscoverVulnerability
the
vulnerability
on
up-to-date
handsets
running
the
latest
Motorola
Android
bootloader
.
Motorola
said
patches
to
fix
Vulnerability-related.PatchVulnerability
the
vulnerability
in
both
devices
are
expected
this
month
.
“
Exploiting
the
vulnerability
allows
the
adversary
to
gain
an
unrestricted
root
shell
.
(
And
more
!
)
,
”
wrote
Roee
Hay
,
manager
of
Aleph
Research
.
He
said
Vulnerability-related.DiscoverVulnerability
vulnerable
versions
of
the
Motorola
Android
bootloader
allow
for
a
kernel
command-line
injection
attack
.
The
vulnerability
(
CVE-2016-10277
)
is
the
same
one
found
Vulnerability-related.DiscoverVulnerability
by
Aleph
Research
earlier
this
year
and
fixed
Vulnerability-related.PatchVulnerability
by
Google
in
May
,
impacting
Vulnerability-related.DiscoverVulnerability
the
Nexus
6
Motorola
bootloader
.
“
By
exploiting
the
vulnerability
,
a
physical
adversary
or
one
with
authorized
USB
fastboot
access
to
the
device
could
break
the
secure/verified
boot
mechanism
,
allowing
him
to
gain
unrestricted
root
privileges
,
and
completely
own
the
user
space
by
loading
a
tampered
or
malicious
image
,
”
wrote
Hay
.
Despite
the
fact
the
vulnerability
had been patched
Vulnerability-related.PatchVulnerability
for
the
Nexus
6
,
Hay
said
the
Moto
G4
and
G5
were still vulnerable
Vulnerability-related.DiscoverVulnerability
to
the
same
kernel
command
line
injection
flaw
.
“
In
the
previous
blog
post
,
we
suggested
that
CVE-2016-10277
could
affect
Vulnerability-related.DiscoverVulnerability
other
Motorola
devices
.
After
receiving
a
few
reports
on
Twitter
that
this
was
indeed
the
case
we
acquired
a
couple
of
Motorola
devices
,
updated
to
the
latest
available
build
we
received
over-the-air
,
”
the
researcher
wrote
on
Wednesday
.
Motorola
told
Threatpost
via
a
statement
that
,
“
A
patch
will
begin
rolling out
Vulnerability-related.PatchVulnerability
for
Moto
G5
within
the
next
week
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
The
patch
for
Moto
G4
is
planned
to
start deployment
Vulnerability-related.PatchVulnerability
at
the
end
of
the
month
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
”
Researchers
were
able
to
trigger
the
vulnerability
on
the
Moto
devices
by
abusing
the
Motorola
bootloader
download
functionality
in
order
to
swap
in
their
own
malicious
initramfs
(
initial
RAM
file
system
)
at
a
known
physical
address
,
named
SCRATCH_ADDR
.
“
We
can
inject
a
parameter
,
named
initrd
,
which
allows
us
to
force
the
Linux
kernel
to
populate
initramfs
into
rootfs
from
a
specified
physical
address
,
”
the
researcher
wrote
.
Next
,
using
malicious
initramfs
to
load
into
a
customized
boot
process
they
were
able
to
gain
root
shell
access
to
the
device
.
Hay
’
s
research
into
the
Motorola
bootloaders
began
in
January
when
he
identified
Vulnerability-related.DiscoverVulnerability
a
high-severity
vulnerability
(
CVE-2016-8467
)
impacting
Vulnerability-related.DiscoverVulnerability
Nexus
6/6P
handsets
.
That
separate
vulnerability
allowed
attackers
to
change
the
bootmode
of
the
device
,
giving
access
to
hidden
USB
interfaces
.
Google
fixed
Vulnerability-related.PatchVulnerability
the
issue
by
hardening
the
bootloader
and
restricting
it
from
loading
custom
bootmodes
.
“
Just
before
Google
released
Vulnerability-related.PatchVulnerability
the
patch
,
we
had discovered
Vulnerability-related.DiscoverVulnerability
a
way
to
bypass
it
on
Nexus
6
,
”
Hay
said
in
May
of
the
second
CVE-2016-10277
vulnerability
.
In
an
interview
with
Hay
by
Threatpost
he
said
Vulnerability-related.DiscoverVulnerability
,
“
Yes
,
they
are
both
bootloader
vulnerabilities
.
The
CVE-2016-10277
can
be
considered
a
generalization
of
CVE-2016-8467
,
but
with
a
much
stronger
impact
,
”
he
said
Vulnerability-related.DiscoverVulnerability
.
Researchers
say
Vulnerability-related.DiscoverVulnerability
several
Motorola
handset
models
are vulnerable
Vulnerability-related.DiscoverVulnerability
to
a
critical
kernel
command
line
injection
flaw
that
could
allow
a
local
malicious
application
to
execute
arbitrary
code
on
the
devices
.
The
two
affected
Motorola
models
are
the
Moto
G4
and
Moto
G5
.
The
warnings
Vulnerability-related.DiscoverVulnerability
come
from
Aleph
Research
which
said
Vulnerability-related.DiscoverVulnerability
it
found
Vulnerability-related.DiscoverVulnerability
the
vulnerability
on
up-to-date
handsets
running
the
latest
Motorola
Android
bootloader
.
Motorola
said
patches
to
fix
Vulnerability-related.PatchVulnerability
the
vulnerability
in
both
devices
are
expected
this
month
.
“
Exploiting
the
vulnerability
allows
the
adversary
to
gain
an
unrestricted
root
shell
.
(
And
more
!
)
,
”
wrote
Roee
Hay
,
manager
of
Aleph
Research
.
He
said
Vulnerability-related.DiscoverVulnerability
vulnerable
versions
of
the
Motorola
Android
bootloader
allow
for
a
kernel
command-line
injection
attack
.
The
vulnerability
(
CVE-2016-10277
)
is
the
same
one
found
Vulnerability-related.DiscoverVulnerability
by
Aleph
Research
earlier
this
year
and
fixed
Vulnerability-related.PatchVulnerability
by
Google
in
May
,
impacting
Vulnerability-related.DiscoverVulnerability
the
Nexus
6
Motorola
bootloader
.
“
By
exploiting
the
vulnerability
,
a
physical
adversary
or
one
with
authorized
USB
fastboot
access
to
the
device
could
break
the
secure/verified
boot
mechanism
,
allowing
him
to
gain
unrestricted
root
privileges
,
and
completely
own
the
user
space
by
loading
a
tampered
or
malicious
image
,
”
wrote
Hay
.
Despite
the
fact
the
vulnerability
had been patched
Vulnerability-related.PatchVulnerability
for
the
Nexus
6
,
Hay
said
the
Moto
G4
and
G5
were still vulnerable
Vulnerability-related.DiscoverVulnerability
to
the
same
kernel
command
line
injection
flaw
.
“
In
the
previous
blog
post
,
we
suggested
that
CVE-2016-10277
could
affect
Vulnerability-related.DiscoverVulnerability
other
Motorola
devices
.
After
receiving
a
few
reports
on
Twitter
that
this
was
indeed
the
case
we
acquired
a
couple
of
Motorola
devices
,
updated
to
the
latest
available
build
we
received
over-the-air
,
”
the
researcher
wrote
on
Wednesday
.
Motorola
told
Threatpost
via
a
statement
that
,
“
A
patch
will
begin
rolling out
Vulnerability-related.PatchVulnerability
for
Moto
G5
within
the
next
week
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
The
patch
for
Moto
G4
is
planned
to
start deployment
Vulnerability-related.PatchVulnerability
at
the
end
of
the
month
and
will
continue
until
all
variants
are updated
Vulnerability-related.PatchVulnerability
.
”
Researchers
were
able
to
trigger
the
vulnerability
on
the
Moto
devices
by
abusing
the
Motorola
bootloader
download
functionality
in
order
to
swap
in
their
own
malicious
initramfs
(
initial
RAM
file
system
)
at
a
known
physical
address
,
named
SCRATCH_ADDR
.
“
We
can
inject
a
parameter
,
named
initrd
,
which
allows
us
to
force
the
Linux
kernel
to
populate
initramfs
into
rootfs
from
a
specified
physical
address
,
”
the
researcher
wrote
.
Next
,
using
malicious
initramfs
to
load
into
a
customized
boot
process
they
were
able
to
gain
root
shell
access
to
the
device
.
Hay
’
s
research
into
the
Motorola
bootloaders
began
in
January
when
he
identified
Vulnerability-related.DiscoverVulnerability
a
high-severity
vulnerability
(
CVE-2016-8467
)
impacting
Vulnerability-related.DiscoverVulnerability
Nexus
6/6P
handsets
.
That
separate
vulnerability
allowed
attackers
to
change
the
bootmode
of
the
device
,
giving
access
to
hidden
USB
interfaces
.
Google
fixed
Vulnerability-related.PatchVulnerability
the
issue
by
hardening
the
bootloader
and
restricting
it
from
loading
custom
bootmodes
.
“
Just
before
Google
released
Vulnerability-related.PatchVulnerability
the
patch
,
we
had discovered
Vulnerability-related.DiscoverVulnerability
a
way
to
bypass
it
on
Nexus
6
,
”
Hay
said
in
May
of
the
second
CVE-2016-10277
vulnerability
.
In
an
interview
with
Hay
by
Threatpost
he
said
Vulnerability-related.DiscoverVulnerability
,
“
Yes
,
they
are
both
bootloader
vulnerabilities
.
The
CVE-2016-10277
can
be
considered
a
generalization
of
CVE-2016-8467
,
but
with
a
much
stronger
impact
,
”
he
said
Vulnerability-related.DiscoverVulnerability
.