CVE-2020-12731
📋 TL;DR
The MagicMotion Flamingo 2 Android application stores sensitive data on the device's external storage (sdcard) without proper access controls, allowing other applications on the same device to read this data. This affects all users of the Flamingo 2 Android app who store personal data through the application.
💻 Affected Systems
- MagicMotion Flamingo 2 Android Application
📦 What is this software?
Flamingo 2 Firmware by Magicsmotion
⚠️ Risk & Real-World Impact
Worst Case
Attackers with malicious apps on the same device could access sensitive user data including photos, personal information, or application-specific data stored by Flamingo 2, potentially leading to privacy violations or identity theft.
Likely Case
Other legitimate but poorly secured apps could inadvertently access and potentially leak Flamingo 2 user data stored on shared storage.
If Mitigated
With proper Android permissions and storage isolation, only the Flamingo 2 app itself can access its stored data.
🎯 Exploit Status
Exploitation requires installing a malicious app on the same device; no special permissions needed beyond basic storage access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown - check Google Play Store for latest version
Vendor Advisory: http://www.magicsmotion.com/p-flamingo.html
Restart Required: No
Instructions:
1. Open Google Play Store 2. Search for 'MagicMotion Flamingo 2' 3. Update to latest version 4. Clear app data/cache if recommended
🔧 Temporary Workarounds
Disable external storage permissions
androidRevoke storage permissions from Flamingo 2 app to prevent data storage to vulnerable location
Android Settings > Apps > Flamingo 2 > Permissions > Storage > Deny
Use Android work profile/isolation
androidInstall Flamingo 2 in isolated work profile to prevent cross-app data access
🧯 If You Can't Patch
- Uninstall the Flamingo 2 application from affected devices
- Use Android's built-in app isolation features or mobile device management (MDM) to restrict storage access
🔍 How to Verify
Check if Vulnerable:
Check if Flamingo 2 app stores data at /sdcard/com.vt.magicmotion/files/Pictures or similar external storage location accessible to other apps
Check Version:
Android Settings > Apps > Flamingo 2 > App info shows version number
Verify Fix Applied:
Verify updated app stores data in internal app storage or properly secured external storage locations
📡 Detection & Monitoring
Log Indicators:
- Access attempts to /sdcard/com.vt.magicmotion/ paths from non-Flamingo apps
Network Indicators:
- None - this is local storage vulnerability
SIEM Query:
Not applicable for local device storage vulnerabilities