First published: Mon Feb 04 2019(Updated: )
In random_get_bytes of random.c, there is a possible degradation of randomness due to an insecure default value. This could lead to local information disclosure via an insecure wireless connection with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-117508900.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 | |
Google Android | =9.0 | |
Google Android | ||
=7.0 | ||
=7.1.1 | ||
=7.1.2 | ||
=8.0 | ||
=8.1 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1997 has been classified as a moderate severity vulnerability due to potential local information disclosure risks.
To mitigate CVE-2019-1997, ensure that your device is updated to a secure version of Android that addresses this vulnerability.
CVE-2019-1997 could lead to information disclosure over an insecure wireless connection without requiring additional execution privileges.
CVE-2019-1997 affects Android versions 7.0, 7.1.1, 7.1.2, 8.0, 8.1, and 9.0.
No, user interaction is not needed for the exploitation of CVE-2019-1997.