First published: Mon Oct 02 2023(Updated: )
In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Google Android | =13.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21252 is a vulnerability in WifiConfigurationUtil.java in Google Android that allows an attacker to cause a denial of service by triggering a boot loop.
CVE-2023-21252 has a severity value of 7, which is classified as high severity.
CVE-2023-21252 can lead to a local denial of service on the device without requiring additional execution privileges.
No, user interaction is not needed for exploiting CVE-2023-21252.
To fix CVE-2023-21252, it is recommended to apply the latest security updates provided by Google for Android.