CVE-2023-21397Detail
This CVE file has been updated once NVD enrichment efforts are completed. The enrichment data provided by the NVD may require a modification due to these modifications.
Description
In the configuration assistant, there is a possible way to record a WiFi network due to an insecure default value. This could lead to a local climbing of privileges without any necessary privilege of execution. User interaction is not necessary for operation.
Metric
NVD enrichment efforts refer to information accessible to the public to associate vector channels. The CVSS information provided by other sources is also displayed.
References to opinions, solutions and tools
By selecting these links, you will leave Nist Webspace. We have provided these links to other websites because they may have information that would interest you. No induction should be drawn due to other referenced sites, or not, from this page. There may be other more suitable websites for your goal. The NIST does not necessarily approve of the points of view expressed, nor agree with the facts presented on these sites. In addition, the NIST does not approve of any commercial product which can be mentioned on these sites. Please respond to comments on this page for [email protected].
Low enumeration
Cwe-Id | CWE name | Source |
---|---|---|
NVD-CWE-NOOINFO |
Insufficient information |
Nist |
CWE-269 |
Inappropriate privilege management |
Cisa-Adp |
Fast information
Entrance to the CVE dictionary:
CVE-2023-21397
NVD published Date:
30/10/2023
Last NVD modified:
21/11/2024
Source:
Android (associated with Google Inc. or Open Handsset Alliance)