CVE-2023-38293

7.3 HIGH

📋 TL;DR

This vulnerability allows local third-party apps on affected Nokia Android devices to execute arbitrary AT commands with radio user privileges via AT command injection in a pre-installed app. No permissions or user interaction are required beyond installing a malicious app. Only Nokia C200 and C100 devices with specific software builds are affected.

💻 Affected Systems

Products:
  • Nokia C200
  • Nokia C100
Versions: Specific Android 12 builds with com.tracfone.tfstatus version 12 (versionCode 31)
Operating Systems: Android 12
Default Config Vulnerable: ⚠️ Yes
Notes: Only devices with specific build fingerprints listed in CVE description are vulnerable. Pre-installed app cannot be uninstalled by users.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise including unauthorized network access, SIM manipulation, call/SMS interception, device tracking, and potential baseband-level attacks.

🟠

Likely Case

Unauthorized AT command execution allowing SIM manipulation, call forwarding, SMS interception, and device information extraction.

🟢

If Mitigated

Limited impact with proper app isolation and input validation preventing command injection.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires installing a malicious app but no permissions or user interaction. Two injection techniques documented in DEF CON presentation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided in CVE

Restart Required: No

Instructions:

1. Check for manufacturer security updates. 2. If update available, install via Settings > System > System update. 3. Monitor Nokia/Tracfone security advisories.

🔧 Temporary Workarounds

Disable vulnerable app

all

Disable the com.tracfone.tfstatus app to prevent exploitation

adb shell pm disable-user --user 0 com.tracfone.tfstatus

Remove app via ADB

all

Remove the vulnerable app package (requires root or system privileges)

adb shell pm uninstall -k --user 0 com.tracfone.tfstatus

🧯 If You Can't Patch

  • Disable or restrict installation of third-party apps from unknown sources
  • Use mobile device management (MDM) to monitor for suspicious AT command execution

🔍 How to Verify

Check if Vulnerable:

Check device build fingerprint: Settings > About phone > Build number. Compare with vulnerable fingerprints in CVE description.

Check Version:

adb shell dumpsys package com.tracfone.tfstatus | grep version

Verify Fix Applied:

Verify com.tracfone.tfstatus app is disabled or removed: adb shell pm list packages | grep tracfone

📡 Detection & Monitoring

Log Indicators:

  • AT command execution from non-system apps
  • Broadcast intents to com.tracfone.tfstatus/.TFStatus

Network Indicators:

  • Unexpected AT command sequences to modem
  • SMS/call anomalies

SIEM Query:

process:com.tracfone.tfstatus AND (event:AT_command OR intent:broadcast)

🔗 References

📤 Share & Export