In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116
Advisories
Source ID Title
EUVD EUVD EUVD-2020-1984 In openAssetFileListener of ContactsProvider2.java, there is a possible permission bypass due to an insecure default value. This could lead to local escalation of privilege to change contact data with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-150857116
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published:

Updated: 2024-08-04T06:02:52.329Z

Reserved: 2019-10-17T00:00:00

Link: CVE-2020-0486

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-15T16:15:13.867

Modified: 2024-11-21T04:53:36.040

Link: CVE-2020-0486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.