Логотип exploitDog
bind:CVE-2023-21179
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-21179

Количество 2

Количество 2

nvd логотип

CVE-2023-21179

больше 2 лет назад

In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-98x7-84p7-vf7h

больше 2 лет назад

In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-21179

In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-98x7-84p7-vf7h

In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865

CVSS3: 7.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу