Summary
An attacker may gain access (by elevated privileges) to CT50-Ex mobile computers through a vulnerability in a system service running the Android Operating System (OS). The system service improperly validates incoming connection requests. Although the vulnerability is significant, currently no known exploits publicly available.
Impact
A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This may enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
Firmware CommonES <3.17.3445 installed on CT50-Ex | Android 4.4 | |
Firmware CommonES <4.01.00.4134 installed on CT50-Ex | Android 6.0 | |
Firmware ECP <2.30.00.0167 installed on CT50-Ex | Android 6.0 |
Vulnerabilities
Expand / Collapse allOn Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.
Remediation
An update is available that resolves this vulnerability. All customers using the impacted products should update their products as indicated in the chart below. Only products listed below are affected by this vulnerability. Updates are available via the Pepperl+Fuchs / ecom product support channel or directly from the original manufacturer Honeywell at https://hsmftp.honeywell.com .
Pepperl+Fuchs strongly recommends that users upgrade to the version identified below to resolve the vulnerability.
CT50-Ex, Android 6.0, Update to CommonES 4.01.00.4134 or later
CT50-Ex, Android 6.0, Update ECP to version 2.30.00.0167 or later (if applicable)
CT50-Ex, Android 4.4, Update to CommonES 3.17.3445 or later
For support, please contact your local Pepperl+Fuchs sales representative.
Revision History
Version | Date | Summary |
---|---|---|
1 | 19.10.2018 12:00 | Initial revision. |
2 | 06.11.2024 12:27 | Fix: correct certvde domain, added self-reference |
3 | 14.05.2025 14:28 | Fix: version space, firmware category, added distribution |