CVE-2021-0523UI Misrepresentation / Clickjacking in Google Android

Severity
7.3HIGHNVD
EPSS
0.0%
top 97.45%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 21
Latest updateMay 24

Description

In onCreate of WifiScanModeActivity.java, there is a possible way to enable Wi-Fi scanning without user consent due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-174047492

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 1.3 | Impact: 5.9

Affected Packages3 packages

CVEListV5google/androidAndroid-10 Android-11
NVDgoogle/android10.0, 11.0+1
Androidplatform/packages_apps_settings10:010:2021-06-01+1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-9qmv-39gp-vcq7: In onCreate of WifiScanModeActivity2022-05-24
CVEList
CVE-2021-0523: In onCreate of WifiScanModeActivity2021-06-21
OSV
CVE-2021-0523: In onCreate of WifiScanModeActivity2021-06-01

📋Vendor Advisories

1
Android
CVE-2021-0523: Android Security Bulletin 2021-06-01 CVE: CVE-2021-0523 Severity: HIGH Type: EoP Affected AOSP versions: 10, 11 References: A-1740474922021-06-01
CVE-2021-0523 — UI Misrepresentation / Clickjacking | cvebase