CVE-2020-28055
📋 TL;DR
This vulnerability allows local unprivileged attackers, such as malicious apps or users, to read and write to critical directories in TCL Android Smart TV file systems. Attackers can perform fake system upgrades by writing to the /data/vendor/upgrade folder. Affected are TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below.
💻 Affected Systems
- TCL Android Smart TV series V8-R851T02-LF1
- TCL Android Smart TV series V8-T658T01-LF1
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete TV compromise allowing installation of persistent malware, firmware modification, data theft, and potential lateral movement to other devices on the network.
Likely Case
Malicious apps gaining elevated privileges, installing unauthorized software, modifying system files, and potentially bricking the TV.
If Mitigated
Limited to app sandbox escape but no further system compromise if proper directory permissions are enforced.
🎯 Exploit Status
Exploitation requires local access or malicious app installation. Public details available in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions above V295 for V8-R851T02-LF1 and above V373 for V8-T658T01-LF1
Vendor Advisory: https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_Press-Statement-and-Questions_11162020.pdf
Restart Required: Yes
Instructions:
1. Check current TV firmware version in Settings > About. 2. If vulnerable, enable automatic updates in Settings > System > Update. 3. Manually check for updates and install if available. 4. Restart TV after update completes.
🔧 Temporary Workarounds
Disable Unknown Sources
androidPrevents installation of malicious APKs that could exploit this vulnerability
Settings > Security > Unknown Sources (set to OFF)
Restrict App Permissions
androidReview and restrict permissions for installed apps, especially file system access
Settings > Apps > [App Name] > Permissions
🧯 If You Can't Patch
- Disconnect TV from network when not in use to prevent remote app installation
- Only install apps from official Google Play Store, avoid sideloading APKs
🔍 How to Verify
Check if Vulnerable:
Check TV firmware version in Settings > About > Build number. If version is V295 or below for V8-R851T02-LF1 series, or V373 or below for V8-T658T01-LF1 series, the device is vulnerable.
Check Version:
Settings > About > Build number
Verify Fix Applied:
After update, verify firmware version is above V295 for V8-R851T02-LF1 or above V373 for V8-T658T01-LF1. Test with security scanning tools if available.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized file access to /data/vendor/tcl, /data/vendor/upgrade, /var/TerminalManager
- Unexpected system upgrade processes
- Permission denied errors for system directories
Network Indicators:
- Unusual outbound connections from TV to unknown servers
- Unexpected network traffic during system updates
SIEM Query:
source="tv_logs" AND (path="/data/vendor/tcl/*" OR path="/data/vendor/upgrade/*" OR path="/var/TerminalManager/*") AND user!="system"
🔗 References
- https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-012.md
- https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_GlobalFAQ.pdf
- https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_Press-Statement-and-Questions_11162020.pdf
- https://securityledger.com/2020/11/security-holes-opened-back-door-to-tcl-android-smart-tvs/
- https://securityledger.com/2020/11/tv-maker-tcl-denies-back-door-promises-better-process/
- https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/
- https://sick.codes/sick-2020-012
- https://support.tcl.com/vulnerabilities-found-in-tcl-android-tvs
- https://twitter.com/johnjhacking/
- https://twitter.com/sickcodes/
- https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-012.md
- https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_GlobalFAQ.pdf
- https://github.com/sickcodes/security/blob/master/etc/CVE-2020-27403_CVE-2020-28055_Press-Statement-and-Questions_11162020.pdf
- https://securityledger.com/2020/11/security-holes-opened-back-door-to-tcl-android-smart-tvs/
- https://securityledger.com/2020/11/tv-maker-tcl-denies-back-door-promises-better-process/
- https://sick.codes/extraordinary-vulnerabilities-discovered-in-tcl-android-tvs-now-worlds-3rd-largest-tv-manufacturer/
- https://sick.codes/sick-2020-012
- https://support.tcl.com/vulnerabilities-found-in-tcl-android-tvs
- https://twitter.com/johnjhacking/
- https://twitter.com/sickcodes/