CVE-2023-21179

Source
https://cve.org/CVERecord?id=CVE-2023-21179
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-21179.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-21179
Aliases
Published
2023-06-28T18:15:14.720Z
Modified
2026-03-14T11:58:03.178407Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-21179.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "13.0"
            }
        ]
    }
]