CVE-2024-13173

7.5 HIGH

📋 TL;DR

The health module in affected Vivo devices has insufficient URL loading restrictions, allowing attackers to access sensitive information. This vulnerability affects Vivo smartphone users with specific software versions. Attackers could exploit this to leak device information or potentially access restricted data.

💻 Affected Systems

Products:
  • Vivo smartphones with health module
Versions: Specific versions not detailed in advisory; check vendor advisory for exact range
Operating Systems: Android-based Vivo Funtouch OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the health module component; exact affected models not specified in available information

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device information disclosure including sensitive health data, location information, and personal identifiers

🟠

Likely Case

Limited information leakage about device status, health metrics, and system configuration

🟢

If Mitigated

No information leakage with proper URL filtering and access controls

🌐 Internet-Facing: MEDIUM - Requires user interaction or malicious app installation
🏢 Internal Only: LOW - Primarily affects individual devices rather than network infrastructure

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires user interaction or malicious app installation; no known public exploits

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest Vivo software updates

Vendor Advisory: https://www.vivo.com/en/support/security-advisory-detail?id=14

Restart Required: No

Instructions:

1. Navigate to Settings > System Update on your Vivo device. 2. Check for available updates. 3. Download and install the latest software version. 4. Ensure the health module is updated through the app store if applicable.

🔧 Temporary Workarounds

Disable health module permissions

all

Restrict the health module's access to sensitive data and network resources

Settings > Apps > Health Module > Permissions > Disable all permissions

Network restriction

all

Block health module from accessing external URLs via firewall

🧯 If You Can't Patch

  • Disable or uninstall the health module if not essential
  • Implement network segmentation to isolate affected devices from sensitive data

🔍 How to Verify

Check if Vulnerable:

Check device software version against Vivo's security advisory; if running affected version, assume vulnerable

Check Version:

Settings > About Phone > Software Information > Build Number

Verify Fix Applied:

Verify software version is updated beyond vulnerable versions listed in advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL access attempts from health module
  • Health module accessing unexpected domains

Network Indicators:

  • Health module making external HTTP/HTTPS requests to unusual domains
  • Data exfiltration patterns from health-related endpoints

SIEM Query:

source="device_logs" AND process="health_module" AND (url_contains="http" OR url_contains="https")

🔗 References

📤 Share & Export