Description
Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}} This binary is reported to be present in the following devices: BLU Studio G BLU Studio G Plus BLU Studio 6.0 HD BLU Studio X BLU Studio X Plus BLU Studio C HD Infinix Hot X507 Infinix Hot 2 X510 Infinix Zero X506 Infinix Zero 2 X509 DOOGEE Voyager 2 DG310 LEAGOO Lead 5 LEAGOO Lead 6 LEAGOO Lead 3i LEAGOO Lead 2S LEAGOO Alfa 6 IKU Colorful K45i Beeline Pro 2 XOLO Cube 5.0
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-7485 | Android devices with code from Ragentek contain a privileged binary that performs over-the-air (OTA) update checks. Additionally, there are multiple techniques used to hide the execution of this binary. This behavior could be described as a rootkit. This binary, which resides as /system/bin/debugs, runs with root privileges and does not communicate over an encrypted channel. The binary has been shown to communicate with three hosts via HTTP: oyag[.]lhzbdvm[.]com oyag[.]prugskh[.]net oyag[.]prugskh[.]com Server responses to requests sent by the debugs binary include functionalities to execute arbitrary commands as root, install applications, or update configurations. Examples of a request sent by the client binary: POST /pagt/agent?data={"name":"c_regist","details":{...}} HTTP/1. 1 Host: 114.80.68.223 Connection: Close An example response from the server could be: HTTP/1.1 200 OK {"code": "01", "name": "push_commands", "details": {"server_id": "1" , "title": "Test Command", "comments": "Test", "commands": "touch /tmp/test"}} This binary is reported to be present in the following devices: BLU Studio G BLU Studio G Plus BLU Studio 6.0 HD BLU Studio X BLU Studio X Plus BLU Studio C HD Infinix Hot X507 Infinix Hot 2 X510 Infinix Zero X506 Infinix Zero 2 X509 DOOGEE Voyager 2 DG310 LEAGOO Lead 5 LEAGOO Lead 6 LEAGOO Lead 3i LEAGOO Lead 2S LEAGOO Alfa 6 IKU Colorful K45i Beeline Pro 2 XOLO Cube 5.0 |
References
History
No history.
Subscriptions
Beeline
Subscribe
Pro 2
Subscribe
Pro 2 Firmware
Subscribe
Bluproducts
Subscribe
Studio 6.0 Hd
Subscribe
Studio 6.0 Hd Firmware
Subscribe
Studio C Hd
Subscribe
Studio C Hd Firmware
Subscribe
Studio G
Subscribe
Studio G Firmware
Subscribe
Studio G Plus
Subscribe
Studio G Plus Firmware
Subscribe
Studio X
Subscribe
Studio X Firmware
Subscribe
Studio X Plus
Subscribe
Studio X Plus Firmware
Subscribe
Doogee
Subscribe
Voyager 2 Dg310i
Subscribe
Voyager 2 Dg310i Firmware
Subscribe
Iku-mobile
Subscribe
Colorful K45i
Subscribe
Colorful K45i Firmware
Subscribe
Infinixauthority
Subscribe
Hot 2 X510
Subscribe
Hot 2 X510 Firmware
Subscribe
Hot X507
Subscribe
Hot X507 Firmware
Subscribe
Zero 2 X509
Subscribe
Zero 2 X509 Firmware
Subscribe
Zero X506
Subscribe
Zero X506 Firmware
Subscribe
Leagoo
Subscribe
Alfa 6
Subscribe
Alfa 6 Firmware
Subscribe
Lead 2s
Subscribe
Lead 2s Firmware
Subscribe
Lead 3i
Subscribe
Lead 3i Firmware
Subscribe
Lead 5
Subscribe
Lead 5 Firmware
Subscribe
Lead 6
Subscribe
Lead 6 Firmware
Subscribe
Xolo
Subscribe
Cube 5.0
Subscribe
Cube 5.0 Firmware
Subscribe
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T01:36:28.064Z
Reserved: 2016-08-03T00:00:00.000Z
Link: CVE-2016-6564
No data.
Status : Modified
Published: 2018-07-13T20:29:01.050
Modified: 2024-11-21T02:56:21.923
Link: CVE-2016-6564
No data.
OpenCVE Enrichment
No data.
EUVD