CVE-2023-42470
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Android devices running the Imou Life app (com.mm.android.smartlifeiot) by sending a crafted intent to an exported component. The app's WebView has JavaScript enabled and loads web content directly, enabling exploitation. All users of the affected Android app versions are at risk.
💻 Affected Systems
- Imou Life (com.mm.android.smartlifeiot)
📦 What is this software?
Life by Imoulife
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing installation of malware, data theft, surveillance, and persistence as a backdoor.
Likely Case
Attacker gains control of the app's permissions to access camera, microphone, location, and personal data stored by the app.
If Mitigated
Limited impact if app is uninstalled or device has strict app isolation and minimal permissions granted.
🎯 Exploit Status
Proof-of-concept APK available on GitHub. Exploitation requires user interaction (clicking malicious link) or another app sending crafted intent.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Not available
Restart Required: No
Instructions:
1. Check for app updates in Google Play Store. 2. If no update beyond 6.8.0 is available, uninstall the app. 3. Monitor vendor communications for security updates.
🔧 Temporary Workarounds
Uninstall vulnerable app
androidRemove the Imou Life app from Android devices
Settings > Apps > Imou Life > Uninstall
Disable app from receiving intents
androidUse Android settings to prevent the app from being launched by other apps
Settings > Apps > Imou Life > Open by default > Clear defaults and disable 'Open supported links'
🧯 If You Can't Patch
- Isolate device on separate network segment with strict outbound filtering
- Implement mobile device management (MDM) to restrict app installations and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check app version in Android Settings > Apps > Imou Life. If version is 6.8.0 or earlier, device is vulnerable.
Check Version:
adb shell dumpsys package com.mm.android.smartlifeiot | grep versionName
Verify Fix Applied:
Verify app is either updated to version beyond 6.8.0 or completely uninstalled from the device.
📡 Detection & Monitoring
Log Indicators:
- Android logs showing intents sent to com.mm.android.easy4ip.MainActivity
- Unexpected WebView JavaScript execution in app logs
Network Indicators:
- Unusual outbound connections from the Imou app to unknown domains
- Suspicious APK downloads or installation attempts
SIEM Query:
source="android_logs" AND (activity="com.mm.android.easy4ip.MainActivity" OR package="com.mm.android.smartlifeiot") AND event="intent_received"
🔗 References
- https://github.com/actuator/cve/blob/main/CVE-2023-42470
- https://github.com/actuator/imou/blob/main/imou-life-6.8.0.md
- https://github.com/actuator/imou/blob/main/poc.apk
- https://github.com/actuator/cve/blob/main/CVE-2023-42470
- https://github.com/actuator/imou/blob/main/imou-life-6.8.0.md
- https://github.com/actuator/imou/blob/main/poc.apk