CVE-2021-41850
📋 TL;DR
This vulnerability allows any third-party app on affected Luna Simo devices to read the device's IMEI values without requiring any permissions. The IMEI data is written to system properties at startup by a pre-installed app and can be accessed by all co-located applications. This affects users of specific Luna Simo Android devices with the vulnerable firmware.
💻 Affected Systems
- Luna Simo Android devices
📦 What is this software?
G9 Firmware by Bluproducts
G90 Firmware by Bluproducts
Tommy 3 Firmware by Wikomobile
⚠️ Risk & Real-World Impact
Worst Case
Malicious apps could collect IMEI data for device tracking, SIM swapping attacks, or creating device fingerprints for targeted attacks without user knowledge.
Likely Case
Apps with legitimate purposes but questionable privacy practices could collect IMEI data for analytics or advertising tracking without proper user consent.
If Mitigated
With proper app vetting and security controls, the risk is limited to apps that have already been installed and granted basic device access.
🎯 Exploit Status
Exploitation requires installing a malicious app, but no special permissions are needed to read the exposed system properties.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://simowireless.com/
Restart Required: No
Instructions:
Check with device manufacturer for firmware updates. If available, update to latest firmware version.
🔧 Temporary Workarounds
Disable or remove vulnerable app
androidDisable the com.skyroam.silverhelper app if possible through device settings
adb shell pm disable-user --user 0 com.skyroam.silverhelper
Restrict app installations
allOnly install apps from trusted sources and review app permissions carefully
🧯 If You Can't Patch
- Isolate affected devices from sensitive networks and data
- Implement mobile device management (MDM) with strict app whitelisting policies
🔍 How to Verify
Check if Vulnerable:
Run 'adb shell getprop | grep imei' on connected device. If IMEI values are displayed in readable format, device is vulnerable.
Check Version:
adb shell getprop ro.build.fingerprint
Verify Fix Applied:
After update or workaround, run same command. IMEI values should not be exposed in system properties.
📡 Detection & Monitoring
Log Indicators:
- Unusual app accessing system properties, particularly IMEI-related properties
Network Indicators:
- Device IMEI being transmitted to unexpected external servers
SIEM Query:
process_name:getprop AND command_line:*imei*
🔗 References
- https://athack.com/session-details/401
- https://simowireless.com/
- https://www.kryptowire.com/android-firmware-2022/
- https://www.kryptowire.com/blog/vsim-vulnerability-within-simo-android-phones-exposed/
- https://athack.com/session-details/401
- https://simowireless.com/
- https://www.kryptowire.com/android-firmware-2022/
- https://www.kryptowire.com/blog/vsim-vulnerability-within-simo-android-phones-exposed/