In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-25420 | In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-09-19T16:10:21.568Z
Reserved: 2022-11-03T22:37:50.652Z
Link: CVE-2023-21252
Updated: 2024-08-02T09:28:26.230Z
Status : Modified
Published: 2023-10-06T19:15:12.730
Modified: 2024-11-21T07:42:29.820
Link: CVE-2023-21252
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD