First published: Tue Jun 06 2023(Updated: )
In Connectivity Service, there is a possible missing permission check. This could lead to local escalation of privilege with no additional execution privileges.
Credit: security@unisoc.com security@unisoc.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Google Android | =10.0 | |
Any of | ||
Unisoc S8000 | ||
Unisoc SC7731E | ||
Unisoc SC9832E | ||
Unisoc SC9863A | ||
Unisoc T310 | ||
Unisoc T606 | ||
Unisoc T610 | ||
Unisoc T612 | ||
Unisoc T616 | ||
UniSoc T618 | ||
Unisoc T760 | ||
Unisoc T770 | ||
Unisoc T820 | ||
Google Android | =10.0 | |
Unisoc S8000 | ||
Unisoc SC7731E | ||
Unisoc SC9832E | ||
Unisoc SC9863A | ||
Unisoc T310 | ||
Unisoc T606 | ||
Unisoc T610 | ||
Unisoc T612 | ||
Unisoc T616 | ||
UniSoc T618 | ||
Unisoc T760 | ||
Unisoc T770 | ||
Unisoc T820 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30863 has a medium severity rating due to the potential for local privilege escalation.
To remediate CVE-2023-30863, update your Android device to the latest security patches provided by the manufacturer.
CVE-2023-30863 specifically affects the Android version 10.0.
Yes, due to the missing permission check, third-party applications could exploit CVE-2023-30863 for privilege escalation.
CVE-2023-30863 primarily affects devices running Android 10.0, but whether specific Unisoc models are impacted depends on their OS version and security updates.