Back to overview

Pepperl+Fuchs: ecom Mobile devices prone to Android privilege elevation vulnerability

VDE-2018-016
Last update
05/14/2025 14:28
Published at
10/19/2018 12:00
Vendor(s)
Pepperl+Fuchs SE
External ID
VDE-2018-016
CSAF Document

Summary

An attacker may gain access (by elevated privileges) to CT50-Ex mobile computers through a vulnerability in a system service running the Android Operating System (OS). The system service improperly validates incoming connection requests. Although the vulnerability is significant, currently no known exploits publicly available.

Impact

A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This may enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.

Affected Product(s)

Model no. Product name Affected versions
Firmware CommonES <3.17.3445 installed on CT50-Ex Android 4.4
Firmware CommonES <4.01.00.4134 installed on CT50-Ex Android 6.0
Firmware ECP <2.30.00.0167 installed on CT50-Ex Android 6.0

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Improper Privilege Management (CWE-269)
Summary

On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.

References

Remediation

An update is available that resolves this vulnerability. All customers using the impacted products should update their products as indicated in the chart below. Only products listed below are affected by this vulnerability. Updates are available via the Pepperl+Fuchs / ecom product support channel or directly from the original manufacturer Honeywell at https://hsmftp.honeywell.com .

Pepperl+Fuchs strongly recommends that users upgrade to the version identified below to resolve the vulnerability.

CT50-Ex, Android 6.0, Update to CommonES 4.01.00.4134 or later

CT50-Ex, Android 6.0, Update ECP to version 2.30.00.0167 or later (if applicable)

CT50-Ex, Android 4.4, Update to CommonES 3.17.3445 or later

For support, please contact your local Pepperl+Fuchs sales representative.

Revision History

Version Date Summary
1 10/19/2018 12:00 Initial revision.
2 11/06/2024 12:27 Fix: correct certvde domain, added self-reference
3 05/14/2025 14:28 Fix: version space, firmware category, added distribution