VYPR
High severity8.4NVD Advisory· Published May 19, 2026· Updated May 19, 2026

CVE-2026-5804

CVE-2026-5804

Description

An improper authentication vulnerability was discovered in the Motorola Factory Test component (com.motorola.motocit). The application contained a reference to a writable file descriptor in external storage which could be used by third party apps running on the device to open a TCP server, exposing sensitive permissions and data. This could allow a local attacker to bypass permission checks and access protected device settings.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A local attacker can bypass authentication in Motorola’s Factory Test app by exploiting a writable file descriptor to open a TCP server and access sensitive device settings.

An improper authentication vulnerability (CWE-306) exists in the Motorola Factory Test component (com.motorola.motocit). The application holds a reference to a writable file descriptor in external storage, enabling a local third-party app to open a TCP server. This bypasses the intended permission checks, exposing sensitive permissions and data [1].

Exploitation

The attack is local, requiring low privileges (AV:L/AC:L/PR:L), no user interaction, and no special network position beyond local device access. Any third-party app installed on the device could exploit the writable descriptor to start the TCP server, circumventing the Factory Test app’s authentication and authorization controls [1].

Impact

A successful exploit allows the attacker to access protected device settings and potentially modify system configurations, resulting in high confidentiality and integrity impact (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N, score 8.4). No elevation beyond local execution is required, but compromised settings could lead to further system compromise [1].

Mitigation

Motorola has released a fix in software versions with Security Patch Level (SPL) 2026-04-05 or later. Users should update their devices immediately. The vulnerability was discovered and disclosed by Pranil Gholap, and no workaround other than updating is available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.