CVE-2023-27647
📋 TL;DR
This vulnerability in DUALSPACE Lock Master v2.2.4 allows local attackers to cause denial of service or access sensitive information through improper access control in the SharedPrefProvider component. It affects Android users who have this specific version of the app installed. The issue stems from insecure implementation of the insert method in the app's content provider.
💻 Affected Systems
- DUALSPACE Lock Master
📦 What is this software?
Lock Master by Dualspace
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains unauthorized access to sensitive app data including potentially stored credentials or lock patterns, leading to complete compromise of the app's security functionality.
Likely Case
Local attacker causes app crashes (denial of service) or accesses limited sensitive information stored within the app's shared preferences.
If Mitigated
With proper Android permission controls and app sandboxing, impact is limited to the specific app's data rather than system-wide compromise.
🎯 Exploit Status
Exploitation requires local access to the device. The vulnerability is documented with technical details in public repositories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown - check for updates in Google Play Store
Vendor Advisory: No official vendor advisory found
Restart Required: Yes
Instructions:
1. Open Google Play Store 2. Search for DUALSPACE Lock Master 3. If update available, tap Update 4. Restart device after update completes
🔧 Temporary Workarounds
Uninstall vulnerable app
androidRemove the vulnerable version of DUALSPACE Lock Master from the device
adb uninstall com.ludashi.superlock
Disable app permissions
androidRevoke all permissions from the vulnerable app in Android settings
🧯 If You Can't Patch
- Isolate device from sensitive networks and data
- Monitor for unusual app behavior or crashes
🔍 How to Verify
Check if Vulnerable:
Check app version in Android Settings > Apps > DUALSPACE Lock Master > App info
Check Version:
adb shell dumpsys package com.ludashi.superlock | grep versionName
Verify Fix Applied:
Verify app version is updated beyond v2.2.4 in Google Play Store
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to com.ludashi.superlock content provider
- App crashes or unexpected behavior in Lock Master
Network Indicators:
- No network indicators - local vulnerability only
SIEM Query:
No applicable network SIEM query - monitor local app logs and behavior
🔗 References
- http://www.dualspace.com/pc/en/products.html
- https://app-lock-master.en.uptodown.com/android/download
- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27647/CVE%20detail.md
- http://www.dualspace.com/pc/en/products.html
- https://app-lock-master.en.uptodown.com/android/download
- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27647/CVE%20detail.md