In callCallbackForRequest of ConnectivityService.java, there is a possible permission bypass due to a missing permission check. This could lead to local information disclosure of the current SSID with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9Android ID: A-161370134
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/2020-11-01 | vendor advisory |
https://www.usenix.org/conference/usenixsecurity19/presentation/reardon | third party advisory |
https://www.usenix.org/system/files/sec19-reardon.pdf | third party advisory exploit |