Sploit.io - Search

Product: P10 Plus, version: Versions earlier than VKY-AL00C00B153

CVE-2017-8141

Severity: Unknown

Description: The Touch Panel (TP) driver in P10 Plus smart phones with software versions earlier than VKY-AL00C00B153 has a memory double free vulnerability. An attacker with the root privilege of the Android system tricks a user into installing a malicious application, and the application can start multiple threads and try to free specific memory, which could triggers double free and causes a system crash or arbitrary code execution.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.001140000
  • Percentile: 0.301740000
  • Date: 2026-02-16

ExploitDB

No data available.

HackerOne Data

  • Rank: 8707
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Huawei Technologies Co., Ltd. P10 Plus - Versions: Versions earlier than VKY-AL00C00B153

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, a memory double free in the Touch Panel (TP) driver of the Huawei P10 Plus, presents a moderate risk. The nature of a double free vulnerability means that a memory location is freed twice, potentially leading to corruption of the heap and subsequent system instability or arbitrary code execution. The business impact can range from a simple system crash, impacting user productivity, to complete compromise of the device, potentially exposing sensitive data. The likelihood of exploitation is moderate, as it requires the attacker to have root privilege on the Android system and trick a user into installing a malicious application. However, once the malicious application is installed, the exploitation is relatively straightforward. The ease of exploitation is also moderate as root access on Android devices is increasingly common, particularly with user modifications or exploits. The vulnerability impacts availability (system crash), integrity (heap corruption), and potentially confidentiality (arbitrary code execution leading to data theft). The EPSS score of 0.001140000 suggests a low but non-negligible real-world exploitation probability.

    2. Potential Attack Scenarios
    An attacker could craft a malicious application that, once installed by a user on a vulnerable P10 Plus, begins to aggressively allocate and free memory through the Touch Panel driver. The application utilizes multiple threads to increase the likelihood of triggering the double free condition. Specifically, the application exploits the TP driver when handling touch input, creating a race condition where the same memory block is freed twice in different threads. This double free corrupts the heap, eventually leading to a system crash. A more advanced attacker could leverage the heap corruption to gain arbitrary code execution, allowing them to install a backdoor, steal data (contacts, photos, messages), or monitor user activity. The attack vector is a user-installed application, making social engineering a key component of the attack.

    3. Mitigation Recommendations
    The primary mitigation is to update the Huawei P10 Plus to a software version later than VKY-AL00C00B153. This patch addresses the double free vulnerability in the Touch Panel driver. Users should check for updates within the device settings (typically under System > Software Update). Organizations deploying P10 Plus devices should prioritize the update rollout. As an immediate action, users should be cautious when installing applications from untrusted sources. Encourage users to review application permissions before installation. Regularly scan devices with a reputable mobile security solution to detect potentially malicious applications. Further details can be found in the Huawei security advisory: http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170612-01-smartphone-en

    4. Executive Summary
    The Huawei P10 Plus smartphone is affected by a memory double free vulnerability in its Touch Panel driver. This vulnerability could allow a malicious application, once installed by a user, to crash the device or potentially gain full control of it, leading to data theft or compromise. While the attacker needs root privilege, the risk is significant given the increasing prevalence of root access on Android devices. Updating to software version VKY-AL00C00B153 or later is the primary mitigation. We recommend that all P10 Plus users and organizations deploying these devices prioritize this update to minimize the risk of system crashes and potential data breaches. Careful application installation habits are also recommended to reduce the attack surface. Addressing this vulnerability is important to ensure the continued availability, integrity, and confidentiality of data on P10 Plus devices.