CVE-2023-38297

8.4 HIGH

📋 TL;DR

A vulnerable pre-installed Android app (com.factory.mmigroup) exposes system-level functionality to local third-party apps without requiring permissions. This allows malicious apps to execute AT commands, perform factory resets, leak device identifiers, and control device settings on affected Android devices from multiple manufacturers. The vulnerability affects specific device models from Samsung, T-Mobile, Boost Mobile, Realme, and Lenovo.

💻 Affected Systems

Products:
  • Samsung Galaxy A03S
  • T-Mobile Revvl 6 Pro 5G
  • T-Mobile Revvl V+ 5G
  • Boost Mobile Celero 5G
  • Realme C25Y
  • Lenovo Tab M8 HD
Versions: Specific Android builds listed in CVE description (versionCode='3', versionName='2.1' of com.factory.mmigroup)
Operating Systems: Android 10, Android 11, Android 12, Android 13
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in pre-installed factory apps on carrier devices; exact capabilities vary by device model and chipset.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise including arbitrary AT command execution (potentially enabling baseband attacks), permanent data loss via factory reset, and persistent device control.

🟠

Likely Case

Malicious apps stealing device identifiers (IMEI, serial numbers), disabling connectivity features, or performing disruptive actions like powering off devices.

🟢

If Mitigated

Limited information disclosure if app is removed or properly secured with access controls.

🌐 Internet-Facing: LOW (requires local app installation, not directly network exploitable)
🏢 Internal Only: HIGH (any installed malicious app can exploit without user interaction)

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires installing a malicious app but no user interaction beyond that; detailed research presented at DEF CON 31.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided in CVE

Restart Required: No

Instructions:

Contact device manufacturers/carriers for security updates; check for firmware updates specific to affected device models.

🔧 Temporary Workarounds

Disable or remove vulnerable app

android

Use ADB to disable or uninstall the com.factory.mmigroup package if device allows it

adb shell pm disable-user --user 0 com.factory.mmigroup
adb shell pm uninstall -k --user 0 com.factory.mmigroup

Restrict app installations

android

Only install apps from trusted sources (Google Play Store) and disable unknown sources

🧯 If You Can't Patch

  • Monitor for suspicious apps requesting no permissions but accessing system functions
  • Consider device replacement if on affected models and security-critical use case

🔍 How to Verify

Check if Vulnerable:

Check if com.factory.mmigroup package exists and has versionCode 3: adb shell dumpsys package com.factory.mmigroup | grep versionCode

Check Version:

adb shell dumpsys package com.factory.mmigroup | grep version

Verify Fix Applied:

Verify package is removed or disabled: adb shell pm list packages | grep factory.mmigroup

📡 Detection & Monitoring

Log Indicators:

  • Broadcast intents to com.factory.mmigroup/.MMIGroupReceiver
  • AT command execution from non-system apps
  • Unexpected factory reset or device identifier access

Network Indicators:

  • Unusual baseband communication patterns if AT commands exploited

SIEM Query:

android_logs WHERE package_name = 'com.factory.mmigroup' AND intent_action CONTAINS 'broadcast'

🔗 References

📤 Share & Export