CVE-2023-21242Packages Modules Wifi vulnerability

5 documents5 sources
Severity
9.8CRITICALNVD
EPSS
0.9%
top 24.29%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 14

Description

In isServerCertChainValid of InsecureEapNetworkHandler.java, there is a possible way to trust an imposter server due to a logic error in the code. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

Androidplatform/packages_modules_wifi13-next:013-next:2023-08-01+1
CVEListV5google/android13
NVDgoogle/android13.0

Patches

🔴Vulnerability Details

3
CVEList
CVE-2023-21242: In isServerCertChainValid of InsecureEapNetworkHandler2023-08-14
GHSA
GHSA-mrx5-4724-2c6h: In isServerCertChainValid of InsecureEapNetworkHandler2023-08-14
OSV
CVE-2023-21242: In isServerCertChainValid of InsecureEapNetworkHandler2023-08-01

📋Vendor Advisories

1
Android
CVE-2023-21242: Android Security Bulletin 2023-08-01 CVE: CVE-2023-21242 Severity: HIGH Type: EoP Affected AOSP versions: 13 References: A-2778245472023-08-01
CVE-2023-21242 — Packages Modules Wifi vulnerability | cvebase