First published: Mon Dec 04 2023(Updated: )
In firewall service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
Credit: security@unisoc.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Google Android | =11.0 | |
Google Android | =12.0 | |
Any of | ||
unisoc s8000 | ||
Unisoc SC7731 | ||
unisoc sc9832e | ||
unisoc sc9863a | ||
unisoc t310 | ||
unisoc t606 | ||
unisoc t610 | ||
unisoc t612 | ||
unisoc t616 | ||
unisoc t618 | ||
unisoc t760 | ||
unisoc t770 | ||
unisoc t820 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2023-42702.
The severity of CVE-2023-42702 is medium with a CVSS score of 5.5.
CVE-2023-42702 affects Google Android versions 11.0 and 12.0.
CVE-2023-42702 can be exploited by taking advantage of the missing permission check in the firewall service to write permission usage records of an app, leading to local information disclosure without additional execution privileges.
More information about CVE-2023-42702 can be found at the following link: [https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049](https://www.unisoc.com/en_us/secy/announcementDetail/1731138365803266049)