Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7xw4-q2jg-v79p

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In processPhonebookAccess of CachedBluetoothDevice.java, there is a possible permission bypass due to an insecure default value. This could lead to local information disclosure of the user's contact list with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-138529441

In processPhonebookAccess of CachedBluetoothDevice.java, there is a possible permission bypass due to an insecure default value. This could lead to local information disclosure of the user's contact list with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-138529441

EPSS

Процентиль: 2%
0.00015
Низкий

Дефекты

CWE-1188

Связанные уязвимости

CVSS3: 5.5
nvd
около 6 лет назад

In processPhonebookAccess of CachedBluetoothDevice.java, there is a possible permission bypass due to an insecure default value. This could lead to local information disclosure of the user's contact list with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-138529441

EPSS

Процентиль: 2%
0.00015
Низкий

Дефекты

CWE-1188