Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-48481 | The vulnerability is to theft of arbitrary files with system privilege in the LockScreenSettings ("com.lge.lockscreensettings") app in the "com/lge/lockscreensettings/dynamicwallpaper/MyCategoryGuideActivity.java" file. The main problem is that the app launches implicit intents that can be intercepted by third-party apps installed on the same device. They also can return arbitrary data that will be passed to the "onActivityResult()" method. The LockScreenSettings app copies the received file to the "/data/shared/dw/mycategory/wallpaper_01.png" path and then changes the file access mode to world-readable and world-writable. |
| Link | Providers |
|---|---|
| https://lgsecurity.lge.com/bulletins/mobile#updateDetails |
|
Fri, 20 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: LGE
Published:
Updated: 2024-09-20T19:53:10.421Z
Reserved: 2023-09-26T05:57:13.269Z
Link: CVE-2023-44122
Updated: 2024-08-02T19:59:51.570Z
Status : Modified
Published: 2023-09-27T15:19:35.760
Modified: 2024-11-21T08:25:17.417
Link: CVE-2023-44122
No data.
OpenCVE Enrichment
No data.
EUVD