In callCallbackForRequest of ConnectivityService.java, there is a possible permission bypass due to a missing permission check. This could lead to local information disclosure of the current SSID with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-161370134
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/2020-11-01 | Vendor Advisory |
https://www.usenix.org/conference/usenixsecurity19/presentation/reardon | Third Party Advisory |
https://www.usenix.org/system/files/sec19-reardon.pdf | Exploit Third Party Advisory |
https://source.android.com/security/bulletin/2020-11-01 | Vendor Advisory |
https://www.usenix.org/conference/usenixsecurity19/presentation/reardon | Third Party Advisory |
https://www.usenix.org/system/files/sec19-reardon.pdf | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://source.android.com/security/bulletin/2020-11-01 - Vendor Advisory | |
References | () https://www.usenix.org/conference/usenixsecurity19/presentation/reardon - Third Party Advisory | |
References | () https://www.usenix.org/system/files/sec19-reardon.pdf - Exploit, Third Party Advisory |
Information
Published : 2020-11-10 13:15
Updated : 2024-11-21 04:53
NVD link : CVE-2020-0454
Mitre link : CVE-2020-0454
CVE.ORG link : CVE-2020-0454
JSON object : View
Products Affected
- android
CWE
CWE-862
Missing Authorization