CVE-2026-3671 Overview
A security vulnerability has been identified in Freedom Factory dGEN1 devices through version 20260221. This flaw affects the TokenBalanceContentProvider function within the org.ethereumphone.walletmanager.testing123 component, allowing attackers to bypass authorization controls. The vulnerability requires local access to exploit, and a proof-of-concept exploit has been publicly disclosed.
Critical Impact
Improper authorization in the wallet manager component could allow unauthorized access to token balance information on affected dGEN1 devices.
Affected Products
- Freedom Factory dGEN1 (versions up to 20260221)
- org.ethereumphone.walletmanager.testing123 component
Discovery Timeline
- 2026-03-07 - CVE CVE-2026-3671 published to NVD
- 2026-03-09 - Last updated in NVD database
Technical Details for CVE-2026-3671
Vulnerability Analysis
This vulnerability is classified under CWE-266 (Incorrect Privilege Assignment), indicating a fundamental flaw in how privileges are assigned within the affected component. The TokenBalanceContentProvider function fails to properly validate authorization before providing access to token balance data.
The vulnerability exists in the wallet manager component of the dGEN1 Ethereum phone platform. When an attacker with local access manipulates requests to the content provider, they can bypass the intended authorization checks. This allows unauthorized reading of confidential token balance information that should be protected by proper access controls.
According to the vulnerability disclosure, the vendor was contacted early about this issue but did not respond. A proof-of-concept has been published, increasing the risk of exploitation in the wild.
Root Cause
The root cause lies in improper privilege assignment (CWE-266) within the TokenBalanceContentProvider class. The content provider does not adequately verify that the requesting application or process has the appropriate permissions to access token balance data. This allows any local application or actor with device access to query sensitive financial information without proper authorization.
Attack Vector
The attack vector requires local access to the affected dGEN1 device. An attacker must be able to execute code or interact with the content provider interface on the device. The exploitation involves sending crafted queries to the TokenBalanceContentProvider that bypass the expected authorization checks.
The vulnerability manifests in the content provider's authorization logic. When processing balance queries, the component fails to properly validate the caller's permissions, allowing unauthorized data access. Technical details and proof-of-concept code are available via the GitHub Gist PoC.
Detection Methods for CVE-2026-3671
Indicators of Compromise
- Unusual queries to the org.ethereumphone.walletmanager.testing123 content provider from unauthorized applications
- Unexpected access patterns to TokenBalanceContentProvider functions
- Log entries showing content provider access from non-wallet applications
Detection Strategies
- Monitor content provider access logs for queries originating from unexpected package names or UIDs
- Implement runtime application self-protection (RASP) to detect unauthorized content provider access attempts
- Review installed applications for suspicious apps that may attempt to access wallet data
Monitoring Recommendations
- Enable verbose logging for the wallet manager component to track all content provider interactions
- Implement anomaly detection for content provider query patterns
- Regularly audit installed applications on dGEN1 devices for potentially malicious software
How to Mitigate CVE-2026-3671
Immediate Actions Required
- Restrict physical access to affected dGEN1 devices
- Review installed applications and remove any untrusted or unnecessary apps
- Monitor device logs for signs of exploitation attempts
- Contact Freedom Factory for guidance on available security updates
Patch Information
At the time of publication, the vendor (Freedom Factory) has not responded to disclosure attempts and no official patch is available. Users should monitor official Freedom Factory channels for security updates. Additional technical information can be found at VulDB #349559.
Workarounds
- Limit device access to trusted users only until an official patch is released
- Consider disabling or restricting the wallet manager component if not actively needed
- Implement device management policies to control application installation on affected devices
# Monitor content provider access (Android debug)
adb logcat | grep -i "TokenBalanceContentProvider"
adb logcat | grep -i "walletmanager"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

