Описание
The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a "concrete and exploitable risk.
Ссылки
- ExploitThird Party Advisory
- Third Party AdvisoryUS Government Resource
- ExploitThird Party Advisory
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
EPSS
8.1 High
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
** DISPUTED ** The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a "concrete and exploitable risk."
Уязвимость IMAP-сервера голосовой почты прямого доступа с визуальным интерфейсом Visual Voice Mail (VVM) for Android, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS
8.1 High
CVSS3
4.3 Medium
CVSS2