First published: Mon Dec 04 2023(Updated: )
In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
Credit: security@unisoc.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Google Android | =11.0 | |
Google Android | =12.0 | |
Any of | ||
unisoc s8000 | ||
Unisoc SC7731 | ||
unisoc sc9832e | ||
unisoc sc9863a | ||
unisoc t310 | ||
unisoc t606 | ||
unisoc t610 | ||
unisoc t612 | ||
unisoc t616 | ||
unisoc t618 | ||
unisoc t760 | ||
unisoc t770 | ||
unisoc t820 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-42700.
The severity of CVE-2023-42700 is medium.
Google Android versions 11.0 and 12.0 are affected by CVE-2023-42700.
CVE-2023-42700 can be exploited by writing permission usage records of an app due to a missing permission check.
No, no additional execution privileges are needed to exploit CVE-2023-42700.