CVE-2024-22005
11.03.2024, 19:15
there is a possible Authentication Bypass due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Enginsight
Vendor | Product | Version |
---|---|---|
android | 13.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration