First published: Mon Mar 02 2020(Updated: )
In the WifiConfigManager, there is a possible storage of location history which can only be deleted by triggering a factory reset. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-140065828
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Android | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0029 has been classified with a high severity due to its potential for local information disclosure.
To mitigate CVE-2020-0029, users should perform a factory reset to delete any stored location history.
CVE-2020-0029 specifically affects Android version 10.0.
Yes, CVE-2020-0029 can be exploited without user interaction, as it requires only system execution privileges.
The primary risk of CVE-2020-0029 is the unauthorized disclosure of location history stored on affected devices.