First published: Wed Jul 12 2023(Updated: )
In opm service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
Credit: security@unisoc.com security@unisoc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =10.0 | |
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Unisoc S8000 | ||
Unisoc Sc7731e | ||
Unisoc Sc9832e | ||
Unisoc Sc9863a | ||
Unisoc T310 | ||
Unisoc T606 | ||
Unisoc T610 | ||
Unisoc T612 | ||
Unisoc T616 | ||
Unisoc T618 | ||
Unisoc T760 | ||
Unisoc T770 | ||
Unisoc T820 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30926 is a vulnerability in the opm service that allows local information disclosure without additional execution privileges.
CVE-2023-30926 has a severity of 5.5 (medium).
CVE-2023-30926 affects Google Android versions 10.0, 11.0, 12.0, and 13.0.
CVE-2023-30926 can be exploited by unauthorized local users to gain access to sensitive information on the affected system.
A fix or patch for CVE-2023-30926 may be provided by the vendor or project team. It is recommended to update to the latest version of the software to mitigate the vulnerability.