The WifiEnterpriseConfig class in net/wifi/WifiEnterpriseConfig.java in Wi-Fi in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-09-01 includes a password in the return value of a toString method call, which allows attackers to obtain sensitive information via a crafted application, aka internal bug 25624963.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://source.android.com/security/bulletin/2016-09-01.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/92842 - | |
References | () http://www.securitytracker.com/id/1036763 - | |
References | () https://android.googlesource.com/platform/frameworks/base/+/55271d454881b67ff38485fdd97598c542cc2d55 - Issue Tracking, Patch | |
References | () https://android.googlesource.com/platform/frameworks/base/+/81be4e3aac55305cbb5c9d523cf5c96c66604b39 - Issue Tracking, Patch |
Information
Published : 2016-09-11 21:59
Updated : 2024-11-21 02:50
NVD link : CVE-2016-3897
Mitre link : CVE-2016-3897
CVE.ORG link : CVE-2016-3897
JSON object : View
Products Affected
- android
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor