Skip to main content

CVE-2023-49794: CWE-290: Authentication Bypass by Spoofing in tiann KernelSU

Medium
VulnerabilityCVE-2023-49794cvecve-2023-49794cwe-290
Published: Tue Jan 02 2024 (01/02/2024, 19:58:56 UTC)
Source: CVE
Vendor/Project: tiann
Product: KernelSU

Description

KernelSU is a Kernel-based root solution for Android devices. In versions 0.7.1 and prior, the logic of get apk path in KernelSU kernel module can be bypassed, which causes any malicious apk named `me.weishu.kernelsu` get root permission. If a KernelSU module installed device try to install any not checked apk which package name equal to the official KernelSU Manager, it can take over root privileges on the device. As of time of publication, a patched version is not available.

AI-Powered Analysis

AILast updated: 07/04/2025, 23:56:02 UTC

Technical Analysis

CVE-2023-49794 is an authentication bypass vulnerability identified in KernelSU, a kernel-based root management solution for Android devices, specifically affecting versions 0.7.1 and earlier. KernelSU operates by granting root privileges to applications that it recognizes as legitimate, using a kernel module to verify the APK path and package name. The vulnerability arises from flawed logic in the 'get apk path' function within the KernelSU kernel module, which can be bypassed by a malicious APK named exactly 'me.weishu.kernelsu'—the same package name as the official KernelSU Manager app. This spoofing allows the malicious APK to be mistakenly granted root permissions without proper verification. Consequently, an attacker who can install such a malicious APK on a device with KernelSU installed can escalate privileges to root, gaining full control over the device's operating system and data. The vulnerability requires local access (AV:L) with low privileges (PR:L) and user interaction (UI:R) to install the malicious APK. The attack complexity is high (AC:H) due to the need to bypass certain protections and install an APK with the specific package name. The vulnerability impacts confidentiality, integrity, and availability (all rated high), as root access enables an attacker to manipulate system files, intercept data, and disrupt device operations. As of the publication date, no patch or fix is available, increasing the risk for affected devices. No known exploits are reported in the wild yet, but the potential for abuse remains significant given the nature of root access on Android devices.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to employees or users who utilize Android devices with KernelSU installed, particularly in environments where devices are rooted for development, testing, or specialized applications. Root access compromises device security entirely, allowing attackers to bypass security controls, access sensitive corporate data, implant persistent malware, and potentially pivot into corporate networks. The risk is heightened in sectors with strict data protection requirements such as finance, healthcare, and government, where device compromise could lead to data breaches and regulatory penalties under GDPR. Additionally, organizations relying on mobile device management (MDM) solutions that permit or do not restrict rooted devices may face increased exposure. The vulnerability's requirement for user interaction (installing a malicious APK) means social engineering or phishing campaigns could be leveraged to exploit it. The absence of a patch means organizations must rely on detection and mitigation strategies until an official fix is released.

Mitigation Recommendations

1. Immediate mitigation should focus on preventing installation of unauthorized APKs, especially those mimicking the package name 'me.weishu.kernelsu'. This can be enforced via strict application whitelisting and mobile device management policies that block sideloading or installation from untrusted sources. 2. Educate users about the risks of installing apps from unknown sources and the specific danger of apps impersonating trusted system components. 3. Monitor devices for the presence of suspicious APKs with the vulnerable package name and unusual privilege escalations. 4. Employ runtime detection tools capable of identifying unauthorized root access or kernel module manipulations. 5. Where possible, avoid using KernelSU or rooted devices in sensitive environments until a patched version is available. 6. Coordinate with device vendors and KernelSU maintainers to track patch releases and apply updates promptly once available. 7. Implement network segmentation and limit device access to critical corporate resources to reduce lateral movement risk if a device is compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2023-11-30T13:39:50.863Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd73fb

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 11:56:02 PM

Last updated: 8/15/2025, 4:04:16 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats