Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c2cx-322m-jmv2

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In onCreate of WiFiInstaller.java, there is a possible way to install a malicious Hotspot 2.0 configuration due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-176756141

In onCreate of WiFiInstaller.java, there is a possible way to install a malicious Hotspot 2.0 configuration due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-176756141

EPSS

Процентиль: 2%
0.00014
Низкий

Дефекты

CWE-1021

Связанные уязвимости

CVSS3: 7.3
nvd
больше 4 лет назад

In onCreate of WiFiInstaller.java, there is a possible way to install a malicious Hotspot 2.0 configuration due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-176756141

EPSS

Процентиль: 2%
0.00014
Низкий

Дефекты

CWE-1021