CVE-2023-27650

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on devices running vulnerable versions of APUS Group Launcher by exploiting the FONT_FILE parameter. It affects users of APUS Launcher versions 3.10.73 and 3.10.88 on Android devices. The high CVSS score indicates critical severity with network-accessible attack vectors.

💻 Affected Systems

Products:
  • APUS Group Launcher
Versions: 3.10.73 and 3.10.88
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Android devices with vulnerable APUS Launcher versions installed as default launcher.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install malware, steal sensitive data, gain persistent access, and use device as part of botnet.

🟠

Likely Case

Remote code execution leading to data theft, unauthorized app installation, or device takeover for malicious activities.

🟢

If Mitigated

Attack blocked at network perimeter or by app sandboxing, limiting impact to isolated app context.

🌐 Internet-Facing: HIGH - Remote exploitation possible without user interaction via network-accessible vectors.
🏢 Internal Only: LOW - Primarily affects mobile devices directly exposed to internet, not internal enterprise systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in GitHub repository. Remote exploitation without authentication makes weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 3.10.88

Vendor Advisory: https://www.apusapps.com/en/launcher

Restart Required: Yes

Instructions:

1. Open Google Play Store 2. Search for APUS Launcher 3. Update to latest version 4. Restart device to ensure patch is fully applied

🔧 Temporary Workarounds

Disable APUS Launcher

android

Change default launcher to stock Android or trusted alternative launcher

Settings > Apps > Default apps > Home app > Select alternative launcher

Network Blocking

android

Block network access to APUS Launcher using firewall or network policies

adb shell pm disable com.apusapps.launcher (requires USB debugging enabled)

🧯 If You Can't Patch

  • Uninstall APUS Launcher completely and use alternative launcher
  • Implement strict network segmentation to isolate affected devices from critical resources

🔍 How to Verify

Check if Vulnerable:

Check APUS Launcher version in Settings > Apps > APUS Launcher > App info

Check Version:

adb shell dumpsys package com.apusapps.launcher | grep versionName

Verify Fix Applied:

Verify version is newer than 3.10.88 and test with known exploit payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual font file loading attempts
  • APUS Launcher crash logs with suspicious parameters
  • Unexpected process execution from launcher context

Network Indicators:

  • Suspicious network requests to APUS servers with font parameters
  • Unexpected outbound connections from launcher process

SIEM Query:

process_name:"APUS Launcher" AND (event_type:crash OR param_name:"FONT_FILE")

🔗 References

📤 Share & Export