CVE-2023-27192
📋 TL;DR
This vulnerability in DUALSPACE Super Security v2.3.7 allows attackers to cause denial of service by manipulating specific parameters (key_wifi_safe_net_check_url, KEY_Cirus_scan_whitelist, KEY_AD_NEW_USER_AVOID_TIME). Users of this Android security app are affected.
💻 Affected Systems
- DUALSPACE Super Security
- Super Security Virus Cleaner
📦 What is this software?
Super Security by Dualspace
⚠️ Risk & Real-World Impact
Worst Case
Complete application crash rendering security features unavailable, potentially leaving device unprotected against malware.
Likely Case
Temporary service disruption requiring app restart, degrading security functionality.
If Mitigated
Minimal impact if app is updated or workarounds applied, with normal security operations maintained.
🎯 Exploit Status
Parameter manipulation suggests straightforward exploitation; GitHub repository contains CVE details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None provided in references
Restart Required: No
Instructions:
Check Google Play Store for app updates from DUALSPACE; if unavailable, consider alternative security apps.
🔧 Temporary Workarounds
Uninstall vulnerable app
androidRemove DUALSPACE Super Security v2.3.7 to eliminate vulnerability
adb uninstall com.ludashi.security
Use alternative security app
androidReplace with trusted security application from reputable vendor
🧯 If You Can't Patch
- Monitor device for unusual app crashes or performance issues
- Restrict installation of untrusted apps that could exploit this vulnerability
🔍 How to Verify
Check if Vulnerable:
Check app version in Android Settings > Apps > DUALSPACE Super Security
Check Version:
adb shell dumpsys package com.ludashi.security | grep versionName
Verify Fix Applied:
Verify app version is newer than v2.3.7 or app is uninstalled
📡 Detection & Monitoring
Log Indicators:
- App crash logs mentioning DUALSPACE Super Security
- Android system logs showing security app failures
Network Indicators:
- Unusual network activity from security app if parameters manipulated
SIEM Query:
source="android_logs" app="com.ludashi.security" (event="crash" OR event="error")
🔗 References
- http://www.dualspace.com/pc/en/products.html
- https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security
- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27192/CVE%20detail.md
- http://www.dualspace.com/pc/en/products.html
- https://apkpure.com/cn/super-security-virus-cleaner/com.ludashi.security
- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27192/CVE%20detail.md