CVE-2018-14995

Summary

CVECVE-2018-14995
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2018-12-28 21:29:00 UTC
Updated2019-02-07 17:36:00 UTC
DescriptionThe ZTE Blade Vantage Android device with a build fingerprint of ZTE/Z839/sweet:7.1.1/NMF26V/20180120.095344:user/release-keys, the ZTE Blade Spark Android device with a build fingerprint of ZTE/Z971/peony:7.1.1/NMF26V/20171129.143111:user/release-keys, the ZTE ZMAX Pro Android device with a build fingerprint of ZTE/P895T20/urd:6.0.1/MMB29M/20170418.114928:user/release-keys, and the ZTE ZMAX Champ Android device with a build fingerprint of ZTE/Z917VL/fortune:6.0.1/MMB29M/20170327.120922:user/release-keys contain a pre-installed platform app with a package name of com.android.modem.service (versionCode=25, versionName=7.1.1; versionCode=23, versionName=6.0.1) that exports an interface to any app on co-located on the device. Using the exported interface of the com.android.modem.service app, any app can enable and obtain certain log files (modem and logcat) without the appropriate corresponding access permissions. The modem logs contain the phone number and full text body of incoming and outgoing text messages in binary format. In addition, the modem log contains the phone numbers for both incoming and outgoing phone calls. The system-wide logcat logs (those obtained via the logcat binary) tend to contain sensitive user data. Third-party apps are prevented from directly reading the system-wide logcat logs. The capability to read from the system-wide logcat logs is only available to pre-installed system apps and platform apps. The modem log and/or logcat log, once activated, get written to external storage (SD card). An app aware of this vulnerability can enable the logs, parse them for relevant data, and exfiltrate them from the device. The modem log and logcat log are inactive by default, but a third-party app with no permissions can activate them, although the app will need to be granted the READ_EXTERNAL_STORAGE permission to access them.

Risk And Classification

Problem Types: CWE-532

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Hardware Zteusa Zte Blade Spark - All All All
Hardware Zteusa Zte Blade Spark - All All All
Operating System Zteusa Zte Blade Spark Firmware 7.1.1 All All All
Operating System Zteusa Zte Blade Spark Firmware 7.1.1 All All All
Hardware Zteusa Zte Blade Vantage - All All All
Hardware Zteusa Zte Blade Vantage - All All All
Operating System Zteusa Zte Blade Vantage Firmware 7.1.1 All All All
Operating System Zteusa Zte Blade Vantage Firmware 7.1.1 All All All
Hardware Zteusa Zte Zmax Champ - All All All
Hardware Zteusa Zte Zmax Champ - All All All
Operating System Zteusa Zte Zmax Champ Firmware 6.0.1 All All All
Operating System Zteusa Zte Zmax Champ Firmware 6.0.1 All All All
Hardware Zteusa Zte Zmax Pro - All All All
Hardware Zteusa Zte Zmax Pro - All All All
Operating System Zteusa Zte Zmax Pro Firmware 6.0.1 All All All
Operating System Zteusa Zte Zmax Pro Firmware 6.0.1 All All All

References

ReferenceSourceLinkTags
Page not found | Kryptowire MISC www.kryptowire.com Exploit, Third Party Advisory
Kryptowire Provides Details on DEFCON 2018 Presentation: Vulnerable Out of the Box - An Evaluation of Android Carrier Devices - Kryptowire MISC www.kryptowire.com Exploit, Third Party Advisory
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report