CVE-2020-0201 (Critical) detected in Settingsandroid-10.0.0_r33
mend-bolt-for-github opened this issue · 3 comments
CVE-2020-0201 - Critical Severity Vulnerability
Vulnerable Library - Settingsandroid-10.0.0_r33
Library home page: https://android.googlesource.com/platform/packages/apps/Settings
Found in HEAD commit: a353664da30a0b95adee9281a4af5c1d5cacc22e
Found in base branch: master
Vulnerability Details
In showSecurityFields of WifiConfigController.java there is a possible credential leak due to a confused deputy. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-143601727
Publish Date: 2020-06-11
URL: CVE-2020-0201
CVSS 3 Score Details (9.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0201
Release Date: 2020-06-11
Fix Resolution: android-10.0.0_r37
Step up your Open Source Security Game with Mend here
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.