mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
20 lines
1023 B
Markdown
20 lines
1023 B
Markdown
![]() |
### [CVE-2023-45779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45779)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the referenced links.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962
|
||
|
- https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/metaredteam/rtx-cve-2023-45779
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
|