Praetorian503 Posted February 12, 2013 Report Share Posted February 12, 2013 The Huawei Mobile Partner application suffers from having extremely loose access permissions allowing for anyone to replace the files with malicious binaries. Version 23.007.09.00.203 is affected.1. DESCRIPTIONHuawei Mobile Partner application contains a flaw that may allow anattacker to gain access to unauthorized privileges. The issue is dueto the application installing with insecure permissions. This allows aless privileged local attacker or compromised process to replace theoriginal application binary with a malicious application which will beexecuted by a victim user or upon Mobile Partner application Windowsservice restart.2. BACKGROUNDMobile Partner is a built-in application in Huawei 3G USB modems thatallow you to connect to the 3G mobile network for Internet access. Itis widely used by many telcos round the world.3. VERSIONS AFFECTEDTested version: 23.007.09.00.203.4. PROOF-OF-CONCEPT/EXPLOIT//// Tested on Windowsc:\>wmic service get pathname | find "Mobile Partner"C:\Program Files (x86)\Mobile Partner\UpdateDog\ouc.exeC:\Program Files (x86)\Mobile Partner\eap\wifimansvc.exec:\>accesschk -q "C:\Program Files (x86)\Mobile Partner\UpdateDog\ouc.exe"C:\Program Files (x86)\Mobile Partner\UpdateDog\ouc.exe RW Everyone RW BUILTIN\Usersc:\>accesschk -q "C:\Program Files (x86)\Mobile Partner\eap\wifimansvc.exe"C:\Program Files (x86)\Mobile Partner\eap\wifimansvc.exe RW Everyone RW BUILTIN\Usersc:\>accesschk -q "C:\Program Files (x86)\Mobile Partner\Mobile Partner.exe"C:\Program Files (x86)\Mobile Partner\Mobile Partner.exe RW Everyone RW BUILTIN\Users/// Tested on MacYEHG:MacOS tester$ ls -Rl /Applications/Mobile\ Partner.app/ | greprwxrwxrwx | grep "\(app\|mobilepartner\)"-rwxrwxrwx 1 root admin 82496 Oct 6 17:34 mobilepartnerdrwxrwxrwx 3 root admin 102 Oct 6 17:34 XStartScreen.appdrwxrwxrwx 3 root admin 102 Oct 6 17:34 LiveUpd.appdrwxrwxrwx 3 root admin 102 Oct 6 17:34 ouc.app5. SOLUTIONThe vendor has not responded to our security report for months.Workaround is to remove WRITE attribute permission on all MobilePartner executable files for non-administrator and non-systemaccounts.6. VENDORHuawei Technologies Co.,Ltd7. CREDITMyo Soe, http://yehg.net, YGN Ethical Hacker Group, Myanmar.8. DISCLOSURE TIME-LINE2012-10-xx: Contacted the vendor through publicly mentioned emails and forums2013-02-11: No response2013-02-11: Vulnerability not fixed2013-02-11: Vulnerability disclosed9. REFERENCESOriginal Advisory URL:http://core.yehg.net/lab/pr0js/advisories/huawei_mobile_partner-insecure_permission#yehg [2013-02-11]Source: PacketStorm Quote Link to comment Share on other sites More sharing options...