Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8r7r-cjv2-6hrp

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.2

Описание

Android 6.0 has an authentication bypass for attackers with root and physical access. Cryptographic authentication tokens (AuthTokens) used by the Trusted Execution Environment (TEE) are protected by a weak challenge. This allows adversaries to replay previously captured responses and use the TEE without authenticating. All apps using authentication-gated cryptography are vulnerable to this attack, which was confirmed on the LG Nexus 5X.

Android 6.0 has an authentication bypass for attackers with root and physical access. Cryptographic authentication tokens (AuthTokens) used by the Trusted Execution Environment (TEE) are protected by a weak challenge. This allows adversaries to replay previously captured responses and use the TEE without authenticating. All apps using authentication-gated cryptography are vulnerable to this attack, which was confirmed on the LG Nexus 5X.

EPSS

Процентиль: 2%
0.00014
Низкий

6.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.2
nvd
больше 8 лет назад

Android 6.0 has an authentication bypass for attackers with root and physical access. Cryptographic authentication tokens (AuthTokens) used by the Trusted Execution Environment (TEE) are protected by a weak challenge. This allows adversaries to replay previously captured responses and use the TEE without authenticating. All apps using authentication-gated cryptography are vulnerable to this attack, which was confirmed on the LG Nexus 5X.

fstec
около 10 лет назад

Уязвимость операционной системы Android, связанная с недостатками разграничения доступа при аутентификации пользователя и позволяющая нарушителю воспроизводить ранее перехваченные ответы и использовать среду Trusted Execution Environment (TEE) без проверки подлинности

EPSS

Процентиль: 2%
0.00014
Низкий

6.2 Medium

CVSS3