Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v2m8-9547-v9wg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In updateIncomingFileConfirmNotification of BluetoothOppNotification.java, there is a possible permissions bypass. This could lead to local escalation of privilege allowing an attacker with physical possession of the device to transfer files to it over Bluetooth, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160691486

In updateIncomingFileConfirmNotification of BluetoothOppNotification.java, there is a possible permissions bypass. This could lead to local escalation of privilege allowing an attacker with physical possession of the device to transfer files to it over Bluetooth, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160691486

EPSS

Процентиль: 1%
0.00012
Низкий

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 4.6
nvd
около 5 лет назад

In updateIncomingFileConfirmNotification of BluetoothOppNotification.java, there is a possible permissions bypass. This could lead to local escalation of privilege allowing an attacker with physical possession of the device to transfer files to it over Bluetooth, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160691486

EPSS

Процентиль: 1%
0.00012
Низкий

Дефекты

CWE-863