CVE-2023-21179Packages Modules Wifi vulnerability

4 documents4 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 99.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 28

Description

In parseSecurityParamsFromXml of XmlUtil.java, there is a possible bypass of user specified wifi encryption protocol due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-272755865

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

Androidplatform/packages_modules_wifi13-next:013-next:2023-06-01+1
CVEListV5google/androidAndroid-13
NVDgoogle/android13.0

🔴Vulnerability Details

3
CVEList
CVE-2023-21179: In parseSecurityParamsFromXml of XmlUtil2023-06-28
GHSA
GHSA-98x7-84p7-vf7h: In parseSecurityParamsFromXml of XmlUtil2023-06-28
OSV
CVE-2023-21179: In parseSecurityParamsFromXml of XmlUtil2023-06-01
CVE-2023-21179 — Packages Modules Wifi vulnerability | cvebase