In exported content providers of ShannonRcs, there is a possible way to get access to protected content providers due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-246933910References: N/A
History

Wed, 02 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-732
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published: 2023-01-24T00:00:00.000Z

Updated: 2025-04-02T14:44:50.720Z

Reserved: 2022-11-03T00:00:00.000Z

Link: CVE-2023-20923

cve-icon Vulnrichment

Updated: 2024-08-02T09:21:33.555Z

cve-icon NVD

Status : Modified

Published: 2023-01-26T21:18:11.737

Modified: 2025-04-02T15:15:52.730

Link: CVE-2023-20923

cve-icon Redhat

No data.