CVE-2021-0963UI Misrepresentation / Clickjacking in Packages Apps Keychain

Severity
7.1HIGHNVD
EPSS
0.0%
top 98.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 15
Latest updateMar 14

Description

In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199754277

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 1.8 | Impact: 5.2

Affected Packages4 packages

CVEListV5google/androidAndroid-10 Android-11 Android-12 Android-9
NVDgoogle/android4 versions+3
Androidplatform/packages_apps_keychain9:09:2021-12-01+3

🔴Vulnerability Details

2
GHSA
GHSA-8gf6-jmpj-r5h7: In onCreate of KeyChainActivity2021-12-16
OSV
CVE-2021-0963: In onCreate of KeyChainActivity2021-12-01

📋Vendor Advisories

2
CISA ICS
Siemens SIMATIC2024-03-14
Android
CVE-2021-0963: Android Security Bulletin 2021-12-01 CVE: CVE-2021-0963 Severity: HIGH Type: EoP Affected AOSP versions: 9, 10, 11, 12 References: A-199754277 [2]2021-12-01