An issue was discovered in ABOOT in OnePlus 3 and 3T OxygenOS before 4.0.2. The attacker can reboot the device into the fastboot mode, which could be done without any authentication. A physical attacker can press the "Volume Up" button during device boot, where an attacker with ADB access can issue the adb reboot bootloader command. Then, the attacker can put the platform's SELinux in permissive mode, which severely weakens it, by issuing: fastboot oem selinux permissive.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/95706 | Third Party Advisory VDB Entry |
https://securityresear.ch/2017/01/11/fastboot-oem-selinux-permissive/ | Third Party Advisory |
https://www.xda-developers.com/oneplus-33t-bootloader-vulnerability-allows-changing-of-selinux-to-permissive-mode-in-fastboot/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-01-23T06:49:00
Updated: 2017-01-24T10:57:01
Reserved: 2017-01-22T00:00:00
Link: CVE-2017-5554
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-01-23T07:59:00.627
Modified: 2019-10-03T00:03:26.223
Link: CVE-2017-5554
JSON object: View
Redhat Information
No data.
CWE