ShaikUsaf/packages_apps_settings_AOSP10_r33_CVE-2021-0481

CVE-2021-0336 (High) detected in Settingsandroid-10.0.0_r33

Opened this issue · 0 comments

CVE-2021-0336 - High Severity Vulnerability

Vulnerable Library - Settingsandroid-10.0.0_r33

Library home page: https://android.googlesource.com/platform/packages/apps/Settings

Found in HEAD commit: f8a6b9b0bf3637054590a12a3bdf98a685bc5d31

Found in base branch: master

Vulnerable Source Files (1)

/src/com/android/settings/bluetooth/BluetoothPermissionRequest.java

Vulnerability Details

In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161

Publish Date: 2021-02-10

URL: CVE-2021-0336

CVSS 3 Score Details (7.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://source.android.com/security/bulletin/2021-02-01

Release Date: 2021-02-10

Fix Resolution: android-11.0.0_r29


Step up your Open Source Security Game with Mend here