CVE-2017-3758

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass access controls in Lenovo Service Framework components on Android devices, enabling remote code execution. Affected users include anyone with Lenovo Android devices running vulnerable versions of the Lenovo Service Framework application.

💻 Affected Systems

Products:
  • Lenovo Android devices with Lenovo Service Framework
Versions: Lenovo Service Framework versions prior to 4.1.5.1.180124.1115
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Lenovo-branded Android devices including smartphones and tablets

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing installation of malware, data theft, and persistent backdoor access

🟠

Likely Case

Unauthorized app installation, data exfiltration, and device control by attackers

🟢

If Mitigated

No impact if patched or workarounds implemented

🌐 Internet-Facing: HIGH - Can be exploited remotely without user interaction
🏢 Internal Only: LOW - Primarily affects mobile devices, not internal enterprise systems

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity and no authentication required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Lenovo Service Framework 4.1.5.1.180124.1115 or later

Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-15374

Restart Required: Yes

Instructions:

1. Open Google Play Store on affected device 2. Search for Lenovo Service Framework 3. Update to latest version 4. Restart device

🔧 Temporary Workarounds

Disable Lenovo Service Framework

android

Temporarily disable the vulnerable application

adb shell pm disable-user --user 0 com.lenovo.lsf

Remove app permissions

android

Revoke all permissions from Lenovo Service Framework

adb shell pm revoke com.lenovo.lsf android.permission.INTERNET
adb shell pm revoke com.lenovo.lsf android.permission.ACCESS_NETWORK_STATE

🧯 If You Can't Patch

  • Isolate affected devices from untrusted networks
  • Implement mobile device management (MDM) controls to restrict app installations

🔍 How to Verify

Check if Vulnerable:

Check Lenovo Service Framework version in device settings > Apps > Lenovo Service Framework

Check Version:

adb shell dumpsys package com.lenovo.lsf | grep versionName

Verify Fix Applied:

Verify version is 4.1.5.1.180124.1115 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized package installations
  • Suspicious process execution from Lenovo Service Framework

Network Indicators:

  • Unexpected network connections from Lenovo Service Framework app

SIEM Query:

source="android_logs" app="com.lenovo.lsf" (action="install" OR action="execute")

🔗 References

📤 Share & Export