Vulnerability Description
In Java network APIs, there is possible access to sensitive network state due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation in Android versions: Android-11, Android ID: A-141455849
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | 11.0 |
Related Weaknesses (CWE)
References
- https://source.android.com/security/bulletin/android-11Vendor Advisory
- https://www.usenix.org/conference/usenixsecurity19/presentation/reardonThird Party Advisory
- https://www.usenix.org/system/files/sec19-reardon.pdfExploitThird Party Advisory
- https://source.android.com/security/bulletin/android-11Vendor Advisory
- https://www.usenix.org/conference/usenixsecurity19/presentation/reardonThird Party Advisory
- https://www.usenix.org/system/files/sec19-reardon.pdfExploitThird Party Advisory
FAQ
What is CVE-2020-0293?
CVE-2020-0293 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In Java network APIs, there is possible access to sensitive network state due to a missing permission check. This could lead to local information disclosure with no additional execution privileges nee...
How severe is CVE-2020-0293?
CVE-2020-0293 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-0293?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.