mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-08 22:18:22 +00:00
28 lines
1.0 KiB
JSON
28 lines
1.0 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2023-21252",
|
||
|
"sourceIdentifier": "security@android.com",
|
||
|
"published": "2023-10-06T19:15:12.730",
|
||
|
"lastModified": "2023-10-06T19:41:01.643",
|
||
|
"vulnStatus": "Awaiting Analysis",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/044ab0684153c4effb9f4fda47df43ccdc77bda8",
|
||
|
"source": "security@android.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://android.googlesource.com/platform/packages/modules/Wifi/+/50b08ee30e04d185e5ae97a5f717d436fd5a90f3",
|
||
|
"source": "security@android.com"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://source.android.com/security/bulletin/2023-10-01",
|
||
|
"source": "security@android.com"
|
||
|
}
|
||
|
]
|
||
|
}
|