Platform Frameworks Opt Net Wifi vulnerabilities

8 known vulnerabilities affecting platform/frameworks_opt_net_wifi.

Total CVEs
8
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
UNKNOWN8

Vulnerabilities

Page 1 of 1
CVE-2023-21252UNKNOWN≥ 11:0, < 11:2023-10-012023-10-01
CVE-2023-21252 CVE-2023-21252: In validatePassword of WifiConfigurationUtil In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2023-21243UNKNOWN≥ 11:0, < 11:2023-07-012023-07-01
CVE-2023-21243 CVE-2023-21243: In validateForCommonR1andR2 of PasspointConfiguration In validateForCommonR1andR2 of PasspointConfiguration.java, there is a possible way to inflate the size of a config file with no limits due to a buffer overflow. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.
osv
CVE-2022-20463UNKNOWN≥ 11:0, < 11:2023-04-012023-04-01
CVE-2022-20463 CVE-2022-20463: In factoryReset of WifiServiceImpl In factoryReset of WifiServiceImpl.java, there is a possible way to preserve WiFi settings due to a logic error in the code. This could lead to local non-security issues across resets with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2022-20481UNKNOWN≥ 10:0, < 10:2023-02-01≥ 11:0, < 11:2023-02-012023-02-01
CVE-2022-20481 CVE-2022-20481: In multiple files, there is a possible way to preserve WiFi settings due to residual data after a reset In multiple files, there is a possible way to preserve WiFi settings due to residual data after a reset. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.
osv
CVE-2021-0466UNKNOWN≥ 10:0, < 10:2021-05-012021-05-01
CVE-2021-0466 CVE-2021-0466: In startIpClient of ClientModeImpl In startIpClient of ClientModeImpl.java, there is a possible identifier which could be used to track a device. This could lead to remote information disclosure to a proximal attacker, with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2021-0390UNKNOWN≥ 8.1:0, < 8.1:2021-03-01≥ 9:0, < 9:2021-03-01+2 more2021-03-01
CVE-2021-0390 CVE-2021-0390: In various methods of WifiNetworkSuggestionsManager In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2020-0459UNKNOWN≥ 8.0:0, < 8.0:2020-12-01≥ 8.1:0, < 8.1:2020-12-01+2 more2020-12-01
CVE-2020-0459 CVE-2020-0459: In sendConfiguredNetworkChangedBroadcast of WifiConfigManager In sendConfiguredNetworkChangedBroadcast of WifiConfigManager.java, there is a possible leak of sensitive WiFi configuration data due to a missing permission check. This could lead to local information disclosure of WiFi network names with no additional execution privileges needed. User interaction is not needed for exploitation.
osv
CVE-2020-0378UNKNOWN≥ 9:0, < 9:2020-10-01≥ 10:0, < 10:2020-10-012020-10-01
CVE-2020-0378 CVE-2020-0378: In onWnmFrameReceived of PasspointManager In onWnmFrameReceived of PasspointManager.java, there is a missing permission check. This could lead to local information disclosure of location data with User execution privileges needed. User interaction is not needed for exploitation.
osv