Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wph5-xqqj-x883

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In okToConnect of HidHostService.java, there is a possible permission bypass due to an incorrect state check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-79703832

In okToConnect of HidHostService.java, there is a possible permission bypass due to an incorrect state check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-79703832

EPSS

Процентиль: 69%
0.00605
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

In okToConnect of HidHostService.java, there is a possible permission bypass due to an incorrect state check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-79703832

EPSS

Процентиль: 69%
0.00605
Низкий