Vulnerability Name: | CVE-2015-6623 (CCN-108806) | ||||||||
Assigned: | 2015-12-07 | ||||||||
Published: | 2015-12-07 | ||||||||
Updated: | 2015-12-09 | ||||||||
Summary: | Wi-Fi in Android 6.0 before 2015-12-01 allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24872703. | ||||||||
CVSS v3 Severity: | 7.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2015-6623 Source: CCN Type: Android Open Source Project Nexus Security Bulletin - December 2015 Source: CONFIRM Type: Vendor Advisory http://source.android.com/security/bulletin/2015-12-01.html Source: XF Type: UNKNOWN google-android-cve20156623-priv-esc(108806) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |