CVE-2020-12731

7.5 HIGH

📋 TL;DR

The MagicMotion Flamingo 2 Android application stores sensitive data on the device's external storage (sdcard) without proper access controls, allowing other applications on the same device to read this data. This affects all users of the Flamingo 2 Android app who store personal data through the application.

💻 Affected Systems

Products:
  • MagicMotion Flamingo 2 Android Application
Versions: All versions prior to fix (specific fixed version unknown)
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation when app stores data to external storage accessible by other apps.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with malicious apps on the same device could access sensitive user data including photos, personal information, or application-specific data stored by Flamingo 2, potentially leading to privacy violations or identity theft.

🟠

Likely Case

Other legitimate but poorly secured apps could inadvertently access and potentially leak Flamingo 2 user data stored on shared storage.

🟢

If Mitigated

With proper Android permissions and storage isolation, only the Flamingo 2 app itself can access its stored data.

🌐 Internet-Facing: LOW - This is a local device vulnerability requiring malicious or compromised apps on the same device.
🏢 Internal Only: MEDIUM - On devices with multiple apps, this creates cross-application data leakage risks within the device environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires installing a malicious app on the same device; no special permissions needed beyond basic storage access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check Google Play Store for latest version

Vendor Advisory: http://www.magicsmotion.com/p-flamingo.html

Restart Required: No

Instructions:

1. Open Google Play Store 2. Search for 'MagicMotion Flamingo 2' 3. Update to latest version 4. Clear app data/cache if recommended

🔧 Temporary Workarounds

Disable external storage permissions

android

Revoke storage permissions from Flamingo 2 app to prevent data storage to vulnerable location

Android Settings > Apps > Flamingo 2 > Permissions > Storage > Deny

Use Android work profile/isolation

android

Install Flamingo 2 in isolated work profile to prevent cross-app data access

🧯 If You Can't Patch

  • Uninstall the Flamingo 2 application from affected devices
  • Use Android's built-in app isolation features or mobile device management (MDM) to restrict storage access

🔍 How to Verify

Check if Vulnerable:

Check if Flamingo 2 app stores data at /sdcard/com.vt.magicmotion/files/Pictures or similar external storage location accessible to other apps

Check Version:

Android Settings > Apps > Flamingo 2 > App info shows version number

Verify Fix Applied:

Verify updated app stores data in internal app storage or properly secured external storage locations

📡 Detection & Monitoring

Log Indicators:

  • Access attempts to /sdcard/com.vt.magicmotion/ paths from non-Flamingo apps

Network Indicators:

  • None - this is local storage vulnerability

SIEM Query:

Not applicable for local device storage vulnerabilities

🔗 References

📤 Share & Export