Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-5622 : Vulnerability Insights and Analysis

Learn about CVE-2017-5622 affecting OnePlus 3 and 3T devices running OxygenOS before 4.0.3. Find out how unauthorized access via ADB sessions can lead to data extraction.

OxygenOS before version 4.0.3 allows unauthorized access to OnePlus 3 and 3T devices via ADB session initiated by a malicious charger or physical attacker when the device is powered off.

Understanding CVE-2017-5622

What is CVE-2017-5622?

In OxygenOS versions prior to 4.0.3, connecting a charger to a powered-off OnePlus 3 or 3T device enables adbd, potentially granting unauthorized access to the device.

The Impact of CVE-2017-5622

This vulnerability could lead to unauthorized access, exploitation of additional vulnerabilities, and extraction of sensitive information from the affected devices.

Technical Details of CVE-2017-5622

Vulnerability Description

The flaw in OxygenOS allows a malicious charger or physical attacker to establish an unauthorized ADB session with a powered-off OnePlus 3 or 3T device.

Affected Systems and Versions

        Product: OnePlus 3 and 3T
        Versions: OxygenOS before 4.0.3

Exploitation Mechanism

Unauthorized access is gained by initiating an ADB session with the device through a malicious charger or physical access, potentially leading to further exploitation and data exfiltration.

Mitigation and Prevention

Immediate Steps to Take

        Update affected devices to OxygenOS version 4.0.3 or later to mitigate the vulnerability.
        Avoid connecting devices to unknown or untrusted chargers.

Long-Term Security Practices

        Regularly update device firmware and software to patch known vulnerabilities.
        Implement strong physical security measures to prevent unauthorized access to devices.

Patching and Updates

Ensure timely installation of security patches and updates provided by OnePlus to address known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now