CVE-2026-5804
Awaiting Analysis Awaiting Analysis - Queue
Improper Authentication in Motorola Factory Test Component

Publication date: 2026-05-19

Last updated on: 2026-05-19

Assigner: Lenovo Group Ltd.

Description
An improper authentication vulnerability was discovered in the Motorola Factory Test component (com.motorola.motocit). The application contained a reference to a writable file descriptor in external storage which could be used by third party apps running on the device to open a TCP server, exposing sensitive permissions and data. This could allow a local attacker to bypass permission checks and access protected device settings.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-19
Last Modified
2026-05-19
Generated
2026-05-20
AI Q&A
2026-05-20
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
motorola factory_test *
motorola factory_test to 2026-04-05 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate the improper authentication vulnerability in the Motorola Factory Test component (com.motorola.motocit), ensure that your device is updated with the latest security patch level, specifically versions with security patches applied after 2026-04-05.

Applying the vendor-provided security updates will address the writable file descriptor issue in external storage that allows local attackers to bypass permission checks.


Can you explain this vulnerability to me?

This vulnerability is an improper authentication issue found in the Motorola Factory Test component (com.motorola.motocit). The application references a writable file descriptor in external storage that third-party apps on the device can exploit to open a TCP server. This flaw allows a local attacker to bypass permission checks and gain access to protected device settings.


How can this vulnerability impact me? :

The vulnerability can allow a local attacker to bypass permission checks on the device, potentially exposing sensitive permissions and data. This means unauthorized apps could access and manipulate protected device settings, which could compromise device security and user privacy.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows a local attacker to bypass permission checks and access protected device settings by exploiting improper authentication in the Motorola Factory Test component. Such unauthorized access to sensitive permissions and data could lead to violations of data protection and privacy requirements outlined in standards like GDPR and HIPAA, which mandate strict controls over access to personal and sensitive information.

By exposing sensitive device settings and data to unauthorized applications, the vulnerability increases the risk of data breaches and unauthorized data processing, potentially resulting in non-compliance with regulations that require safeguarding personal data and ensuring proper authorization mechanisms.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart