CVE-2018-14825

Summary

CVECVE-2018-14825
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-09-24 19:29:00 UTC
Updated2019-10-09 23:35:00 UTC
DescriptionOn Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.

Risk And Classification

Problem Types: CWE-732

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Google Android 4.4 All All All
Operating System Google Android 6.0 All All All
Operating System Google Android 7.1.0 All All All
Operating System Google Android 8.1 All All All
Operating System Google Android 4.4 All All All
Operating System Google Android 6.0 All All All
Operating System Google Android 7.1.0 All All All
Operating System Google Android 8.1 All All All
Hardware Honeywell Ck75 - All All All
Hardware Honeywell Ck75 - All All All
Hardware Honeywell Cn51 - All All All
Hardware Honeywell Cn51 - All All All
Hardware Honeywell Cn75 - All All All
Hardware Honeywell Cn75 - All All All
Hardware Honeywell Cn75e - All All All
Hardware Honeywell Cn75e - All All All
Hardware Honeywell Cn80 - All All All
Hardware Honeywell Cn80 - All All All
Hardware Honeywell Ct40 - All All All
Hardware Honeywell Ct40 - All All All
Hardware Honeywell Ct50 - All All All
Hardware Honeywell Ct50 - All All All
Hardware Honeywell Ct60 - All All All
Hardware Honeywell Ct60 - All All All
Hardware Honeywell D75e - All All All
Hardware Honeywell D75e - All All All
Hardware Honeywell Eda50 - All All All
Hardware Honeywell Eda50 - All All All
Hardware Honeywell Eda50k - All All All
Hardware Honeywell Eda50k - All All All
Hardware Honeywell Eda51 - All All All
Hardware Honeywell Eda51 - All All All
Hardware Honeywell Eda60k - All All All
Hardware Honeywell Eda60k - All All All
Hardware Honeywell Eda70 - All All All
Hardware Honeywell Eda70 - All All All

References

ReferenceSourceLinkTags
PEPPERL+FUCHS ecom Mobile devices prone to Android privilege elevation vulnerability — German (Germany) MISC cert.vde.com Third Party Advisory
PEPPERL+FUCHS CT50-Ex CVE-2016-9345 Local Privilege Escalation Vulnerability BID www.securityfocus.com Third Party Advisory, VDB Entry
Honeywell Mobile Computers with Android Operating Systems | ICS-CERT MISC ics-cert.us-cert.gov Third Party Advisory, US Government Resource
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report