CVE-2023-35671Improper Privilege Management in Packages Apps NFC

Severity
5.5MEDIUMNVD
EPSS
0.2%
top 58.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 11

Description

In onHostEmulationData of HostEmulationManager.java, there is a possible way for a general purpose NFC reader to read the full card number and expiry details when the device is in locked screen mode due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

Androidplatform/packages_apps_nfc13-next:013-next:2023-09-01+4
CVEListV5google/android4 versions+3
NVDgoogle/android4 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-r97g-mv85-crqf: In onHostEmulationData of HostEmulationManager2023-09-11
OSV
CVE-2023-35671: In onHostEmulationData of HostEmulationManager2023-09-01

📋Vendor Advisories

1
Android
CVE-2023-35671: Android Security Bulletin 2023-09-01 CVE: CVE-2023-35671 Severity: HIGH Type: ID Affected AOSP versions: 11, 12, 12L, 13 References: A-2680386432023-09-01