cve/2023/CVE-2023-45779.md

20 lines
1023 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-45779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45779)
![](https://img.shields.io/static/v1?label=Product&message=Android&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20Android%20SoC%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Unknown&color=brighgreen)
### Description
In the APEX module framework of AOSP, there is a possible malicious update to platform components due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. More details on this can be found in the referenced links.
### POC
#### Reference
- https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-wmcc-g67r-9962
- https://rtx.meta.security/exploitation/2024/01/30/Android-vendors-APEX-test-keys.html
#### Github
- https://github.com/metaredteam/rtx-cve-2023-45779
- https://github.com/nomi-sec/PoC-in-GitHub