Описание
There is a Factory Reset Protection (FRP) bypass vulnerability on several smartphones. The system does not sufficiently verify the permission, an attacker uses a data cable to connect the smartphone to another smartphone and then perform a series of specific operations. Successful exploit could allow the attacker bypass the FRP protection.
Уязвимые конфигурации
Одновременно
Одновременно
EPSS
4.6 Medium
CVSS3
3.6 Low
CVSS2
Дефекты
Связанные уязвимости
There is a Factory Reset Protection (FRP) bypass vulnerability on several smartphones. The system does not sufficiently verify the permission, an attacker uses a data cable to connect the smartphone to another smartphone and then perform a series of specific operations. Successful exploit could allow the attacker bypass the FRP protection.
EPSS
4.6 Medium
CVSS3
3.6 Low
CVSS2