CVE-2023-29766

7.8 HIGH

📋 TL;DR

This vulnerability in CrossX v1.15.3 for Android allows a local attacker to escalate privileges by manipulating database files. The flaw enables unauthorized access to elevated permissions on affected devices. Only Android devices running this specific version of CrossX are impacted.

💻 Affected Systems

Products:
  • CrossX
Versions: v1.15.3
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android devices with CrossX v1.15.3 installed. The vulnerability is in how the app handles database file permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical or remote access to the device gains full administrative control, potentially accessing sensitive data, installing malware, or compromising the entire device.

🟠

Likely Case

Local malware or malicious apps exploit the vulnerability to gain elevated permissions, bypassing Android's security sandbox and accessing restricted data.

🟢

If Mitigated

With proper app sandboxing and file permission controls, exploitation would be limited to the app's own data, preventing system-wide compromise.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring attacker access to the device's file system.
🏢 Internal Only: HIGH - Local attackers or malicious apps can exploit this to gain elevated privileges on affected devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the device's file system. The vulnerability is in database file handling, making exploitation straightforward for attackers with file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.15.4 or later

Vendor Advisory: https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29766/CVE%20detailed.md

Restart Required: Yes

Instructions:

1. Open Google Play Store 2. Search for CrossX 3. Update to latest version (v1.15.4+) 4. Restart device after update

🔧 Temporary Workarounds

Uninstall CrossX

android

Remove the vulnerable application from affected devices

adb uninstall com.crossx.app
Settings > Apps > CrossX > Uninstall

Restrict app permissions

android

Limit CrossX's access to storage and other sensitive permissions

Settings > Apps > CrossX > Permissions > Disable Storage access

🧯 If You Can't Patch

  • Isolate affected devices from sensitive networks and data
  • Implement strict app control policies to prevent unauthorized app installations

🔍 How to Verify

Check if Vulnerable:

Check CrossX version in Settings > Apps > CrossX > App Info. If version is exactly 1.15.3, device is vulnerable.

Check Version:

adb shell dumpsys package com.crossx.app | grep versionName

Verify Fix Applied:

Verify CrossX version is 1.15.4 or higher in app settings. Check that database files have proper permissions (not world-readable/writable).

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to CrossX database files
  • Permission escalation events in Android security logs
  • Abnormal file operations in /data/data/com.crossx.app/

Network Indicators:

  • Unusual outbound connections from CrossX app after local file access

SIEM Query:

source="android_security" AND (event="PERMISSION_ESCALATION" OR app="com.crossx.app")

🔗 References

📤 Share & Export