mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
71 lines
2.5 KiB
JSON
71 lines
2.5 KiB
JSON
![]() |
{
|
||
|
"data_type": "CVE",
|
||
|
"data_format": "MITRE",
|
||
|
"data_version": "4.0",
|
||
|
"CVE_data_meta": {
|
||
|
"ID": "CVE-2020-0227",
|
||
|
"ASSIGNER": "security@android.com",
|
||
|
"STATE": "PUBLIC"
|
||
|
},
|
||
|
"affects": {
|
||
|
"vendor": {
|
||
|
"vendor_data": [
|
||
|
{
|
||
|
"vendor_name": "n/a",
|
||
|
"product": {
|
||
|
"product_data": [
|
||
|
{
|
||
|
"product_name": "Android",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": "Android-8.0"
|
||
|
},
|
||
|
{
|
||
|
"version_value": "Android-8.1"
|
||
|
},
|
||
|
{
|
||
|
"version_value": "Android-9"
|
||
|
},
|
||
|
{
|
||
|
"version_value": "Android-10"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
"problemtype": {
|
||
|
"problemtype_data": [
|
||
|
{
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "eng",
|
||
|
"value": "Elevation of privilege"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"references": {
|
||
|
"reference_data": [
|
||
|
{
|
||
|
"refsource": "CONFIRM",
|
||
|
"name": "https://source.android.com/security/bulletin/2020-07-01",
|
||
|
"url": "https://source.android.com/security/bulletin/2020-07-01"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"description": {
|
||
|
"description_data": [
|
||
|
{
|
||
|
"lang": "eng",
|
||
|
"value": "In onCommand of CompanionDeviceManagerService.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing background data usage or launching from the background, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-129476618"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|