Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3675: Improper Authorization in Freedom Factory dGEN1

0
Medium
VulnerabilityCVE-2026-3675cvecve-2026-3675
Published: Sat Mar 07 2026 (03/07/2026, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Freedom Factory
Product: dGEN1

Description

A vulnerability was determined in Freedom Factory dGEN1 up to 20260221. Affected by this issue is the function FakeAppReceiver of the component org.ethosmobile.ethoslauncher. Executing a manipulation can lead to improper authorization. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/15/2026, 00:59:18 UTC

Technical Analysis

CVE-2026-3675 identifies an improper authorization vulnerability in the Freedom Factory dGEN1 product, affecting versions up to 20260221. The vulnerability resides in the FakeAppReceiver function within the org.ethosmobile.ethoslauncher component. This flaw allows an attacker with local access and low privileges to manipulate the function in a way that bypasses intended authorization controls. The attack vector is local, meaning the attacker must have some form of access to the device or system running dGEN1, but no user interaction is required to exploit the vulnerability. The vulnerability could lead to unauthorized actions or privilege escalation within the system, potentially compromising confidentiality, integrity, and availability of the affected system components. The vendor was notified early but has not responded or issued a patch, and the exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS 4.8 score reflects a medium severity, with low attack complexity but limited scope and impact. No known exploits in the wild have been reported yet, but the public disclosure means threat actors could develop exploits. The vulnerability highlights the importance of robust authorization checks and local access controls in embedded or mobile device environments where dGEN1 is deployed.

Potential Impact

The primary impact of CVE-2026-3675 is unauthorized access or privilege escalation on devices running Freedom Factory dGEN1, potentially allowing attackers to perform actions beyond their intended permissions. This can compromise system integrity by enabling unauthorized modifications, affect confidentiality by exposing sensitive data or system functions, and potentially disrupt availability if critical functions are manipulated. Since exploitation requires local access, the threat is more significant in environments where physical or local network access is possible, such as enterprise mobile devices, embedded systems, or kiosks. The lack of vendor response and patch increases the window of exposure, raising the risk of exploitation over time. Organizations relying on dGEN1 in sensitive or critical environments may face increased risk of insider threats or attacks from compromised local users or malware that gains local foothold. The medium severity suggests the impact is notable but not catastrophic, yet combined with the public exploit disclosure, it warrants timely mitigation to prevent escalation.

Mitigation Recommendations

1. Restrict local access to devices running Freedom Factory dGEN1, enforcing strict physical and network access controls to minimize the risk of local exploitation. 2. Implement enhanced monitoring and logging around the org.ethosmobile.ethoslauncher component, especially the FakeAppReceiver function, to detect suspicious or unauthorized activity. 3. Apply application-level authorization checks independent of the vulnerable function to ensure that even if FakeAppReceiver is manipulated, unauthorized actions are blocked. 4. Segregate critical systems and limit the number of users with local access privileges to reduce the attack surface. 5. Regularly audit and review local user permissions and remove unnecessary privileges. 6. Stay alert for vendor updates or community patches addressing this vulnerability and apply them promptly once available. 7. Consider deploying endpoint protection solutions capable of detecting anomalous behavior related to local privilege escalation attempts. 8. Educate users and administrators about the risks of local access exploitation and enforce policies to prevent unauthorized device access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-06T21:15:22.401Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aca3a8c48b3f10ffd2f1ca

Added to database: 3/7/2026, 10:16:08 PM

Last enriched: 3/15/2026, 12:59:18 AM

Last updated: 4/22/2026, 3:21:13 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses