Exploiting Qualcomm EDL Programmers (2): Storage-based Attacks & Rooting
Tags
attack-pattern: | Data Tool - T1588.002 Vulnerabilities - T1588.006 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | a55b8c53-1a49-4329-a479-4a486dae4537 |
Fingerprint | b7e48f15c365f9fd |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Jan. 22, 2018, midnight |
Added to db | Jan. 18, 2023, 8:04 p.m. |
Last updated | Oct. 17, 2024, 11:49 a.m. |
Headline | Exploiting Qualcomm EDL Programmers (2): Storage-based Attacks & Rooting |
Title | Exploiting Qualcomm EDL Programmers (2): Storage-based Attacks & Rooting |
Detected Hints/Tags/Attributes | 29/1/11 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://alephsecurity.com/2018/01/22/qualcomm-edl-2/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 3 | cve-2017-5626 |
|
Details | CVE | 3 | cve-2017-5624 |
|
Details | CVE | 2 | cve-2016-10277 |
|
Details | Domain | 2 | firehorse.py |
|
Details | Domain | 34 | ro.build |
|
Details | File | 2 | firehorse.py |
|
Details | File | 1 | aboot-old.bin |
|
Details | File | 1 | singleimage.bin |
|
Details | File | 2 | gpt.bin |
|
Details | File | 7 | cpio.gz |
|
Details | File | 1 | devinfo.bin |