Description
In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-25420 | In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
References
History
Thu, 19 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-09-19T16:10:21.568Z
Reserved: 2022-11-03T22:37:50.652Z
Link: CVE-2023-21252
Updated: 2024-08-02T09:28:26.230Z
Status : Modified
Published: 2023-10-06T19:15:12.730
Modified: 2024-11-21T07:42:29.820
Link: CVE-2023-21252
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD