<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Motorola — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/motorola/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 16:19:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/motorola/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-5804 - Motorola Factory Test Improper Authentication Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-5804-motorola-factory-test-improper-auth/</link><pubDate>Tue, 19 May 2026 16:19:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-5804-motorola-factory-test-improper-auth/</guid><description>The Motorola Factory Test component (com.motorola.motocit) contains an improper authentication vulnerability, allowing a local attacker to bypass permission checks and access protected device settings by leveraging a writable file descriptor in external storage to open a TCP server.</description><content:encoded><![CDATA[<p>CVE-2026-5804 describes an improper authentication vulnerability in the Motorola Factory Test component (com.motorola.motocit), which is a component present on Motorola (now Lenovo) Android devices. The vulnerability stems from the application containing a reference to a writable file descriptor in external storage. This flaw allows a malicious third-party application, running on the same device, to exploit this file descriptor to open a TCP server. This could expose sensitive permissions and data, enabling a local attacker to bypass permission checks and ultimately access protected device settings. This vulnerability poses a significant risk to device security and user privacy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker installs a malicious application on the Android device.</li>
<li>The malicious application identifies the writable file descriptor associated with the Motorola Factory Test component in external storage.</li>
<li>The malicious application leverages the writable file descriptor to open a TCP server.</li>
<li>The TCP server allows the malicious application to intercept communications intended for the Motorola Factory Test component.</li>
<li>The malicious application bypasses authentication checks due to the exposed permissions.</li>
<li>The malicious application gains unauthorized access to protected device settings.</li>
<li>The attacker modifies sensitive device configurations, potentially compromising device security and user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5804 allows a local attacker to bypass permission checks and access protected device settings on affected Motorola devices. This could lead to unauthorized modification of device configurations, exposure of sensitive data, and overall compromise of device security. The vulnerability has a CVSS v3.1 base score of 8.4, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Lenovo as described in the Motorola support article to patch CVE-2026-5804 (<a href="https://en-us.support.motorola.com/app/answers/detail/a_id/192534)">https://en-us.support.motorola.com/app/answers/detail/a_id/192534)</a>.</li>
<li>Deploy the Sigma rule provided below to detect applications attempting to access the Motorola Factory Test component via TCP connections.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>android</category><category>cve-2026-5804</category></item></channel></rss>