DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
References
Link | Resource |
---|---|
https://www.forescout.com/company/blog/dten-vulnerability/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-01-06T19:55:50
Updated: 2020-01-06T19:55:50
Reserved: 2019-09-12T00:00:00
Link: CVE-2019-16273
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-01-06T20:15:11.960
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-16273
JSON object: View
Redhat Information
No data.
CWE