In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the referenced links.
References
Configurations
History
21 Nov 2024, 08:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962 - | |
References | () https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html - | |
References | () https://source.android.com/security/bulletin/2023-12-01 - Vendor Advisory | |
References | () https://www.fairphone.com/en/2024/01/30/security-update-apex-modules-vulnerability-fixed/ - |
01 Feb 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the referenced links. |
31 Jan 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the links below: https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962 |
30 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the links below: https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962 https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962 |
26 Jan 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
26 Jan 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the following links (which go live Jan 30th, 2024). |
26 Jan 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://source.android.com/security/bulletin/2023-12-01 - Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
Summary | In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the following links (which go live Jan 30th, 2024): * https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html * https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962 https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962 * https://www.fairphone.com/en/2023/12/22/security-update-apex-modules-vulnerability-fixed https://www.fairphone.com/en/2023/12/22/security-update-apex-modules-vulnerability-fixed | |
CPE | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* | |
First Time |
Google
Google android |
04 Dec 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-04 23:15
Updated : 2024-11-21 08:27
NVD link : CVE-2023-45779
Mitre link : CVE-2023-45779
CVE.ORG link : CVE-2023-45779
JSON object : View
Products Affected
- android
CWE