Vulnerability Description
On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, PIN authentication can be bypassed by creating a special file within the /data/local/tmp/ directory. The System application that implements the lock screen checks for the existence of a specific file and disables PIN authentication if it exists. This file would typically be created via Android Debug Bridge (adb) over USB.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alcatelmobile | Cingular Flip 2 Firmware | b9huah1 |
| Alcatelmobile | Cingularl Flip 2 | - |
Related Weaknesses (CWE)
References
- https://www.nccgroup.trust/uk/our-research/?research=Technical+advisoriesThird Party Advisory
- https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabiExploitThird Party Advisory
- https://www.nccgroup.trust/uk/our-research/?research=Technical+advisoriesThird Party Advisory
- https://www.nccgroup.trust/us/our-research/technical-advisory-multiple-vulnerabiExploitThird Party Advisory
FAQ
What is CVE-2019-16241?
CVE-2019-16241 is a vulnerability with a CVSS score of 6.8 (MEDIUM). On TCL Alcatel Cingular Flip 2 B9HUAH1 devices, PIN authentication can be bypassed by creating a special file within the /data/local/tmp/ directory. The System application that implements the lock scr...
How severe is CVE-2019-16241?
CVE-2019-16241 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-16241?
Check the references section above for vendor advisories and patch information. Affected products include: Alcatelmobile Cingular Flip 2 Firmware, Alcatelmobile Cingularl Flip 2.