CVE-2023-49794: CWE-290: Authentication Bypass by Spoofing in tiann KernelSU
KernelSU is a Kernel-based root solution for Android devices. In versions 0.7.1 and prior, the logic of get apk path in KernelSU kernel module can be bypassed, which causes any malicious apk named `me.weishu.kernelsu` get root permission. If a KernelSU module installed device try to install any not checked apk which package name equal to the official KernelSU Manager, it can take over root privileges on the device. As of time of publication, a patched version is not available.
AI Analysis
Technical Summary
CVE-2023-49794 is an authentication bypass vulnerability identified in KernelSU, a kernel-based root management solution for Android devices, specifically affecting versions 0.7.1 and earlier. KernelSU operates by granting root privileges to applications that it recognizes as legitimate, using a kernel module to verify the APK path and package name. The vulnerability arises from flawed logic in the 'get apk path' function within the KernelSU kernel module, which can be bypassed by a malicious APK named exactly 'me.weishu.kernelsu'—the same package name as the official KernelSU Manager app. This spoofing allows the malicious APK to be mistakenly granted root permissions without proper verification. Consequently, an attacker who can install such a malicious APK on a device with KernelSU installed can escalate privileges to root, gaining full control over the device's operating system and data. The vulnerability requires local access (AV:L) with low privileges (PR:L) and user interaction (UI:R) to install the malicious APK. The attack complexity is high (AC:H) due to the need to bypass certain protections and install an APK with the specific package name. The vulnerability impacts confidentiality, integrity, and availability (all rated high), as root access enables an attacker to manipulate system files, intercept data, and disrupt device operations. As of the publication date, no patch or fix is available, increasing the risk for affected devices. No known exploits are reported in the wild yet, but the potential for abuse remains significant given the nature of root access on Android devices.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to employees or users who utilize Android devices with KernelSU installed, particularly in environments where devices are rooted for development, testing, or specialized applications. Root access compromises device security entirely, allowing attackers to bypass security controls, access sensitive corporate data, implant persistent malware, and potentially pivot into corporate networks. The risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government, where device compromise could lead to data breaches and regulatory penalties under GDPR. Additionally, organizations relying on mobile device management (MDM) solutions that permit or do not restrict rooted devices may face increased exposure. The vulnerability's requirement for user interaction (installing a malicious APK) means social engineering or phishing campaigns could be leveraged to exploit it. The absence of a patch means organizations must rely on detection and mitigation strategies until an official fix is released.
Mitigation Recommendations
1. Immediate mitigation should focus on preventing installation of unauthorized APKs, especially those mimicking the package name 'me.weishu.kernelsu'. This can be enforced via strict application whitelisting and mobile device management policies that block sideloading or installation from untrusted sources. 2. Educate users about the risks of installing apps from unknown sources and the specific danger of apps impersonating trusted system components. 3. Monitor devices for the presence of suspicious APKs with the vulnerable package name and unusual privilege escalations. 4. Employ runtime detection tools capable of identifying unauthorized root access or kernel module manipulations. 5. Where possible, avoid using KernelSU or rooted devices in sensitive environments until a patched version is available. 6. Coordinate with device vendors and KernelSU maintainers to track patch releases and apply updates promptly once available. 7. Implement network segmentation and limit device access to critical corporate resources to reduce lateral movement risk if a device is compromised.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Finland
CVE-2023-49794: CWE-290: Authentication Bypass by Spoofing in tiann KernelSU
Description
KernelSU is a Kernel-based root solution for Android devices. In versions 0.7.1 and prior, the logic of get apk path in KernelSU kernel module can be bypassed, which causes any malicious apk named `me.weishu.kernelsu` get root permission. If a KernelSU module installed device try to install any not checked apk which package name equal to the official KernelSU Manager, it can take over root privileges on the device. As of time of publication, a patched version is not available.
AI-Powered Analysis
Technical Analysis
CVE-2023-49794 is an authentication bypass vulnerability identified in KernelSU, a kernel-based root management solution for Android devices, specifically affecting versions 0.7.1 and earlier. KernelSU operates by granting root privileges to applications that it recognizes as legitimate, using a kernel module to verify the APK path and package name. The vulnerability arises from flawed logic in the 'get apk path' function within the KernelSU kernel module, which can be bypassed by a malicious APK named exactly 'me.weishu.kernelsu'—the same package name as the official KernelSU Manager app. This spoofing allows the malicious APK to be mistakenly granted root permissions without proper verification. Consequently, an attacker who can install such a malicious APK on a device with KernelSU installed can escalate privileges to root, gaining full control over the device's operating system and data. The vulnerability requires local access (AV:L) with low privileges (PR:L) and user interaction (UI:R) to install the malicious APK. The attack complexity is high (AC:H) due to the need to bypass certain protections and install an APK with the specific package name. The vulnerability impacts confidentiality, integrity, and availability (all rated high), as root access enables an attacker to manipulate system files, intercept data, and disrupt device operations. As of the publication date, no patch or fix is available, increasing the risk for affected devices. No known exploits are reported in the wild yet, but the potential for abuse remains significant given the nature of root access on Android devices.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily to employees or users who utilize Android devices with KernelSU installed, particularly in environments where devices are rooted for development, testing, or specialized applications. Root access compromises device security entirely, allowing attackers to bypass security controls, access sensitive corporate data, implant persistent malware, and potentially pivot into corporate networks. The risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government, where device compromise could lead to data breaches and regulatory penalties under GDPR. Additionally, organizations relying on mobile device management (MDM) solutions that permit or do not restrict rooted devices may face increased exposure. The vulnerability's requirement for user interaction (installing a malicious APK) means social engineering or phishing campaigns could be leveraged to exploit it. The absence of a patch means organizations must rely on detection and mitigation strategies until an official fix is released.
Mitigation Recommendations
1. Immediate mitigation should focus on preventing installation of unauthorized APKs, especially those mimicking the package name 'me.weishu.kernelsu'. This can be enforced via strict application whitelisting and mobile device management policies that block sideloading or installation from untrusted sources. 2. Educate users about the risks of installing apps from unknown sources and the specific danger of apps impersonating trusted system components. 3. Monitor devices for the presence of suspicious APKs with the vulnerable package name and unusual privilege escalations. 4. Employ runtime detection tools capable of identifying unauthorized root access or kernel module manipulations. 5. Where possible, avoid using KernelSU or rooted devices in sensitive environments until a patched version is available. 6. Coordinate with device vendors and KernelSU maintainers to track patch releases and apply updates promptly once available. 7. Implement network segmentation and limit device access to critical corporate resources to reduce lateral movement risk if a device is compromised.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2023-11-30T13:39:50.863Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd73fb
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/4/2025, 11:56:02 PM
Last updated: 8/15/2025, 4:04:16 AM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.