cvelist/2021/39xxx/CVE-2021-39763.json

62 lines
2.0 KiB
JSON
Raw Normal View History

2021-08-23 20:00:50 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2021-39763",
2022-03-30 16:02:48 +00:00
"ASSIGNER": "security@android.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "n/a",
"product": {
"product_data": [
{
"product_name": "Android",
"version": {
"version_data": [
{
"version_value": "Android-12L"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://source.android.com/security/bulletin/android-12l",
"url": "https://source.android.com/security/bulletin/android-12l"
}
]
2021-08-23 20:00:50 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2022-03-30 16:02:48 +00:00
"value": "In Settings, there is a possible way to make the user enable WiFi due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-199176115"
2021-08-23 20:00:50 +00:00
}
]
}
}