7.8
CVSSv3

CVE-2019-14326

Published: 14/04/2020 Updated: 24/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in AndyOS Andy versions up to 46.11.113. By default, it starts telnet and ssh (ports 22 and 23) with root privileges in the emulated Android system. This can be exploited by remote malicious users to gain full access to the device, or by malicious apps installed inside the emulator to perform privilege escalation from a normal user to root (unlike with standard methods of getting root privileges on Android - e.g., the SuperSu program - the user is not asked for consent). There is no authentication performed - access to a root shell is given upon a successful connection. NOTE: although this was originally published with a slightly different CVE ID number, the correct ID for this Andy vulnerability has always been CVE-2019-14326.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

andyroid andy os

Github Repositories

Privilege escalation in Andy emulator

CVEID: CVE-2019-14326 Name of the affected product(s) and version(s): Andy (all versions up to 4611113) Problem type: CWE-284: Improper Access Control Summary Andy is an Android emulator for Windows and Mac During our tests, we have found open local TCP ports which could be exploited to escalate privileges from user to root All versions of Andy (up to and including 46111

Privilege escalation in Andy emulator

CVEID: CVE-2019-14326 Name of the affected product(s) and version(s): Andy (all versions up to 4611113) Problem type: CWE-284: Improper Access Control Summary Andy is an Android emulator for Windows and Mac During our tests, we have found open local TCP ports which could be exploited to escalate privileges from user to root All versions of Andy (up to and including 46111