{"id":180530,"date":"2025-09-25T09:47:12","date_gmt":"2025-09-25T09:47:12","guid":{"rendered":"https:\/\/www.newsbeep.com\/us\/180530\/"},"modified":"2025-09-25T09:47:12","modified_gmt":"2025-09-25T09:47:12","slug":"unpatched-flaw-in-oneplus-phones-lets-rogue-apps-text-messages","status":"publish","type":"post","link":"https:\/\/www.newsbeep.com\/us\/180530\/","title":{"rendered":"Unpatched flaw in OnePlus phones lets rogue apps text messages"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"Unpatched flaw in OnePlus phones lets rogue apps text messages\" height=\"900\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/09\/OnePlus.png\" width=\"1600\"\/><\/p>\n<p>A vulnerability in multiple versions of OxygenOS, the Android-based operating system from OnePlus, allows any installed app to access SMS data and metadata without requiring permission or user interaction.<\/p>\n<p>OnePlus, a subsidiary of Oppo, is a Shenzhen-based consumer electronics maker known for developing high-end smartphones at competitive pricing. While other major Chinese brands like Huawei and Xiaomi aren\u2019t available in the U.S., OnePlus devices are officially available in the country.<\/p>\n<p>The flaw, tracked as CVE-2025-10184, and <a href=\"https:\/\/www.rapid7.com\/blog\/post\/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed\/\" target=\"_blank\" rel=\"nofollow noopener\">discovered by Rapid7 researchers<\/a>, is currently unpatched and exploitable. The Chinese OEM failed to respond to Rapid7\u2019s disclosures to this day, and the cybersecurity company published the technical details along with a proof-of-concept (PoC) exploit.<\/p>\n<p>Source of the problem<\/p>\n<p>The problem arises from OnePlus changing the stock Android Telephony package to introduce additional exported content providers like PushMessageProvider, PushShopProvider, and ServiceNumberProvider.<\/p>\n<p>The manifest for these providers does not declare a write permission for \u2018READ_SMS,\u2019 leaving it open to any app by default, even those that don\u2019t have SMS permissions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"Extra providers OnePlus added on its Telephony package\" height=\"406\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/09\/providers.jpg\" width=\"1200\"\/>Extra providers OnePlus added on its Telephony package<br \/>Source: Rapid7<\/p>\n<p>To make matters worse, client-supplied inputs aren\u2019t sanitized, allowing \u201cblind SQL injection\u201d that could reconstruct SMS content from the device database, bruteforcing it one character at a time.<\/p>\n<p>\u201cBy using an algorithm to repeat this process for each character in each row returned by the sub query, it\u2019s possible to exfiltrate the database content, using the return value from the update method as an indicator of true\/false,\u201d describes Rapid7 in the <a href=\"http:\/\/www.rapid7.com\/blog\/post\/cve-2025-10184-oneplus-oxygenos-telephony-provider-permission-bypass-not-fixed\/\" target=\"_blank\" rel=\"nofollow noopener\">report<\/a>.<\/p>\n<p>So, while the read permission for SMS is correctly set, the write permission isn\u2019t, allowing the inference of SMS content when certain prerequisites are met:\u00a0<\/p>\n<p>Exposed table must already contain at least one row, so update() can return a non-zero \u201crows changed\u201d result.&#13;<br \/>\n\tThe provider must allow insert() so an attacker can create a dummy row to operate on if the table is empty.&#13;<br \/>\n\tThe sms table must be in the same SQLite database file because the injected subquery must be able to reference it.&#13;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"PoC exploit to infer SMS content\" height=\"600\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/09\/poc.jpg\" width=\"661\"\/>PoC exploit to infer SMS content<br \/>Source: Rapid7<\/p>\n<p>Impact and response<\/p>\n<p>The issue impacts all versions of OxygenOS from 12 to the latest one, which is 15, which is the latest, built on top of Android 15.<\/p>\n<p>Rapid7 researchers tested and confirmed vulnerability on OnePlus 8T and 10 Pro, running various OxygenOS versions and Telephony package numbers, but noted that their list is almost definitely non-exhaustive.<\/p>\n<p>\u201cWhile the build numbers above [on the table] are specific to the test devices, as the issue affects a core component of Android, we expect this vulnerability to affect other OnePlus devices running the above versions of OxygenOS, i.e., it does not seem to be a hardware-specific issue,\u201d explained Rapid7.<\/p>\n<p>Device \/ Model&#13;<br \/>\n\t\t\tPackage version&#13;<br \/>\n\t\t\tOxygenOS version&#13;<br \/>\n\t\t\tBuild Number&#13;<br \/>\n\t\tOnePlus 8T \/ KB2003&#13;<br \/>\n\t\t\t3.4.135&#13;<br \/>\n\t\t\t12&#13;<br \/>\n\t\t\tKB2003_11_C.3&#13;<br \/>\n\t\tOnePlus 10 Pro 5G \/ NE2213&#13;<br \/>\n\t\t\t14.10.30&#13;<br \/>\n\t\t\t14&#13;<br \/>\n\t\t\tNE2213_14.0.0.700(EX01)&#13;<br \/>\n\t\tOnePlus 10 Pro 5G \/ NE2213&#13;<br \/>\n\t\t\t15.30.5&#13;<br \/>\n\t\t\t15&#13;<br \/>\n\t\t\tNE2213_15.0.0.502(EX01)&#13;<br \/>\n\t\tOnePlus 10 Pro 5G \/ NE2213&#13;<br \/>\n\t\t\t15.30.10&#13;<br \/>\n\t\t\t15&#13;<br \/>\n\t\t\tNE2213_15.0.0.700(EX01)&#13;<br \/>\n\t\tOnePlus 10 Pro 5G \/ NE2213&#13;<br \/>\n\t\t\t15.40.&#13;<br \/>\n\t\t\t15&#13;<br \/>\n\t\t\tNE2213_15.0.0.901(EX01)&#13;<\/p>\n<p>The researchers tried to contact OnePlus to share their findings on May 1 and followed\u00a0up on alternative email addresses multiple times until August 16.<\/p>\n<p>After receiving no response to seven separate communication attempts, the security firm publicly disclosed the details for CVE-2025-10184.<\/p>\n<p>Shortly after publication of Rapid7&#8217;s report, OnePlus acknowledged the disclosure and said they have launched an investigation into the problem.<\/p>\n<p>BleepingComputer has contacted OnePlus to request a comment, but we are still awaiting a response.<\/p>\n<p>Until a patch is made available, it is recommended to keep the number of installed apps on your OnePlus device to a minimum, only trust reputable publishers, and switch from SMS-based two-factor authentication to OTP apps like Google Authenticator.<\/p>\n<p>Since SMS isn\u2019t properly isolated on OnePlus devices, sensitive communications should only occur on end-to-end encrypted apps.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" alt=\"Picus Blue Report 2025\" src=\"https:\/\/www.newsbeep.com\/us\/wp-content\/uploads\/2025\/08\/blue-report-2025.jpg\" class=\"b-lazy\"\/><\/a><\/p>\n<p>46% of environments had passwords cracked, nearly doubling from 25% last year.<\/p>\n<p>Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Get the Blue Report 2025<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"A vulnerability in multiple versions of OxygenOS, the Android-based operating system from OnePlus, allows any installed app to&hellip;\n","protected":false},"author":2,"featured_media":180531,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[41],"tags":[165,74],"class_list":{"0":"post-180530","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-mobile","9":"tag-technology"},"_links":{"self":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/180530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/comments?post=180530"}],"version-history":[{"count":0,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/posts\/180530\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media\/180531"}],"wp:attachment":[{"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/media?parent=180530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/categories?post=180530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newsbeep.com\/us\/wp-json\/wp\/v2\/tags?post=180530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}