Vulnerability Description
Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android.settings.ChooseLockGeneric class with the PASSWORD_QUALITY_UNSPECIFIED option.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | 4.0 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2013/Nov/204Exploit
- http://www.securitytracker.com/id/1029410
- http://www.theregister.co.uk/2013/12/10/android_has_lockbypass_bug/
- https://cureblog.de/2013/11/cve-2013-6271-remove-device-locks-from-android-phoneExploit
- http://seclists.org/fulldisclosure/2013/Nov/204Exploit
- http://www.securitytracker.com/id/1029410
- http://www.theregister.co.uk/2013/12/10/android_has_lockbypass_bug/
- https://cureblog.de/2013/11/cve-2013-6271-remove-device-locks-from-android-phoneExploit
FAQ
What is CVE-2013-6271?
CVE-2013-6271 is a vulnerability with a CVSS score of 8.8 (HIGH). Android 4.0 through 4.3 allows attackers to bypass intended access restrictions and remove device locks via a crafted application that invokes the updateUnlockMethodAndFinish method in the com.android...
How severe is CVE-2013-6271?
CVE-2013-6271 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6271?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.