Vulnerability found affecting Huawei USB LTE Dongle E3372 (2nd June, 2021)

Ref# AL2021_16 | Date: Jun 2nd 2021

Security Researchers have discovered a vulnerability in Huawei USB LTE dongles model E3372, which allows a malicious user to perform a privilege escalation attack.

How It Works

Privilege escalation attacks rely on a user with limited access to a system being able to obtain a higher level of access, in an illicit manner such as through a vulnerability exploit, or improper permissions on shared file.

While browsing through the driver files installed by the dongle, a researcher came across a file which would auto-run every time the USB dongle was plugged in. It was observed that this “mbbserviceopen” file ran with full permissions. On plugging in the USB device, this file would open a web browser with Huawei”s device management interface. A malicious user would need to replace the file with their own code and wait for the legitimate user to start using the cellular data service via their Huawei device. 

After successfully exploiting this vulnerability, the attacker can perform unauthenticated operations. However, because this vulnerability relies on tampering with the driver software installed on the machine, physical access to the machine is required making this a case of local privilege escalation.

Solution

Users are advised to download and install the Hilink products tool form the following link to solve this issue.

https://consumer.huawei.com/en/support/routers/e3372/

PDF Download: Vulnerability found affecting Huawei USB LTE Dongle E3372.pdf

References