Vulnerability Name: | CCN-201716 | ||||||
Published: | 2021-05-12 | ||||||
Updated: | 2021-05-12 | ||||||
Summary: | Google Android could allow a local attacker to execute arbitrary code on the system, caused by a type confusion flaw in the nfa_rw_sys_disable function in the NFC component. By using a specially-crafted tag content, an attacker could exploit this vulnerability to execute arbitrary code on the system. | ||||||
CVSS v3 Severity: | 8.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||
CVSS v2 Severity: | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: Android Open Source Project Web site Fixing memory leak when NFC is disabled during reading Tag Source: CCN Type: Google Security Research Issue 2155 Android NFC: Type Confusion in nfa_rw_sys_disable Source: XF Type: UNKNOWN android-nfarwsysdisable-code-exec(201716) Source: CCN Type: Packet Storm Security [05-12-2021] Android NFC nfa_rw_sys_disable Type Confusion | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |