Description
In Input Method, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-25506 | In Input Method, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. |
References
| Link | Providers |
|---|---|
| https://source.android.com/docs/security/bulletin/android-14 |
|
History
No history.
Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-09-06T20:16:24.626Z
Reserved: 2022-11-03T22:37:50.661Z
Link: CVE-2023-21338
Updated: 2024-08-02T09:36:33.220Z
Status : Modified
Published: 2023-10-30T17:15:49.667
Modified: 2024-11-21T07:42:40.220
Link: CVE-2023-21338
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD