there is a possible way to bypass cryptographic assurances due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/pixel/2023-07-01 | vendor advisory |