In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-25420 | In validatePassword of WifiConfigurationUtil.java, there is a possible way to get the device into a boot loop due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 19 Sep 2024 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-09-19T16:10:21.568Z
Reserved: 2022-11-03T22:37:50.652Z
Link: CVE-2023-21252
Updated: 2024-08-02T09:28:26.230Z
Status : Modified
Published: 2023-10-06T19:15:12.730
Modified: 2024-11-21T07:42:29.820
Link: CVE-2023-21252
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD