Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-9645

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-12 Mar, 2017 | 06:05
Updated At-06 Aug, 2024 | 13:47
Rejected At-
Credits

The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:12 Mar, 2017 | 06:05
Updated At:06 Aug, 2024 | 13:47
Rejected At:
▼CVE Numbering Authority (CNA)

The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu
x_refsource_MISC
https://bugs.busybox.net/show_bug.cgi?id=7652
x_refsource_CONFIRM
http://openwall.com/lists/oss-security/2015/01/24/4
mailing-list
x_refsource_MLIST
https://security.gentoo.org/glsa/201503-13
vendor-advisory
x_refsource_GENTOO
http://www.securityfocus.com/bid/72324
vdb-entry
x_refsource_BID
https://bugzilla.redhat.com/show_bug.cgi?id=1185707
x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
mailing-list
x_refsource_MLIST
http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
x_refsource_CONFIRM
https://usn.ubuntu.com/3935-1/
vendor-advisory
x_refsource_UBUNTU
http://seclists.org/fulldisclosure/2020/Mar/15
mailing-list
x_refsource_FULLDISC
Hyperlink: https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu
Resource:
x_refsource_MISC
Hyperlink: https://bugs.busybox.net/show_bug.cgi?id=7652
Resource:
x_refsource_CONFIRM
Hyperlink: http://openwall.com/lists/oss-security/2015/01/24/4
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://security.gentoo.org/glsa/201503-13
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.securityfocus.com/bid/72324
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1185707
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3935-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://seclists.org/fulldisclosure/2020/Mar/15
Resource:
mailing-list
x_refsource_FULLDISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu
x_refsource_MISC
x_transferred
https://bugs.busybox.net/show_bug.cgi?id=7652
x_refsource_CONFIRM
x_transferred
http://openwall.com/lists/oss-security/2015/01/24/4
mailing-list
x_refsource_MLIST
x_transferred
https://security.gentoo.org/glsa/201503-13
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.securityfocus.com/bid/72324
vdb-entry
x_refsource_BID
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=1185707
x_refsource_CONFIRM
x_transferred
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
mailing-list
x_refsource_MLIST
x_transferred
http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3935-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://seclists.org/fulldisclosure/2020/Mar/15
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://bugs.busybox.net/show_bug.cgi?id=7652
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://openwall.com/lists/oss-security/2015/01/24/4
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://security.gentoo.org/glsa/201503-13
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.securityfocus.com/bid/72324
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1185707
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3935-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2020/Mar/15
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:12 Mar, 2017 | 06:59
Updated At:20 Apr, 2025 | 01:37

The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.05.5MEDIUM
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.0
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

busybox
busybox
>>busybox>>Versions up to 1.22.1(inclusive)
cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262bcve@mitre.org
Issue Tracking
Patch
Third Party Advisory
http://openwall.com/lists/oss-security/2015/01/24/4cve@mitre.org
Mailing List
Patch
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Mar/15cve@mitre.org
N/A
http://www.securityfocus.com/bid/72324cve@mitre.org
N/A
https://bugs.busybox.net/show_bug.cgi?id=7652cve@mitre.org
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1185707cve@mitre.org
Issue Tracking
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.htmlcve@mitre.org
N/A
https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWucve@mitre.org
Patch
Third Party Advisory
https://security.gentoo.org/glsa/201503-13cve@mitre.org
N/A
https://usn.ubuntu.com/3935-1/cve@mitre.org
N/A
http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262baf854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Patch
Third Party Advisory
http://openwall.com/lists/oss-security/2015/01/24/4af854a3a-2127-422b-91ae-364da2661108
Mailing List
Patch
Third Party Advisory
http://seclists.org/fulldisclosure/2020/Mar/15af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/72324af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugs.busybox.net/show_bug.cgi?id=7652af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1185707af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
https://lists.debian.org/debian-lts-announce/2018/07/msg00037.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWuaf854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
https://security.gentoo.org/glsa/201503-13af854a3a-2127-422b-91ae-364da2661108
N/A
https://usn.ubuntu.com/3935-1/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
Source: cve@mitre.org
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: http://openwall.com/lists/oss-security/2015/01/24/4
Source: cve@mitre.org
Resource:
Mailing List
Patch
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2020/Mar/15
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/72324
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://bugs.busybox.net/show_bug.cgi?id=7652
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1185707
Source: cve@mitre.org
Resource:
Issue Tracking
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu
Source: cve@mitre.org
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/201503-13
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://usn.ubuntu.com/3935-1/
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://git.busybox.net/busybox/commit/?id=4e314faa0aecb66717418e9a47a4451aec59262b
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Patch
Third Party Advisory
Hyperlink: http://openwall.com/lists/oss-security/2015/01/24/4
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Patch
Third Party Advisory
Hyperlink: http://seclists.org/fulldisclosure/2020/Mar/15
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/72324
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://bugs.busybox.net/show_bug.cgi?id=7652
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://bugzilla.redhat.com/show_bug.cgi?id=1185707
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://plus.google.com/+MathiasKrause/posts/PqFCo4bfrWu
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/201503-13
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://usn.ubuntu.com/3935-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

65Records found

CVE-2014-1858
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 22.32%
||
7 Day CHG-0.08%
Published-08 Jan, 2018 | 19:00
Updated-06 Aug, 2024 | 09:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

__init__.py in f2py in NumPy before 1.8.1 allows local users to write to arbitrary files via a symlink attack on a temporary file.

Action-Not Available
Vendor-numpyn/a
Product-numpyn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2016-2781
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.07% / 20.52%
||
7 Day CHG~0.00%
Published-07 Feb, 2017 | 15:00
Updated-09 Jun, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

Action-Not Available
Vendor-n/aGNU
Product-coreutilsn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4225
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 13.54%
||
7 Day CHG~0.00%
Published-08 Jun, 2018 | 18:00
Updated-05 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. watchOS before 4.3.1 is affected. The issue involves the "Security" component. It allows local users to bypass intended restrictions on Keychain state modifications.

Action-Not Available
Vendor-n/aApple Inc.Microsoft Corporation
Product-itunesiphone_oswatchosmac_os_xwindowsicloudn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4036
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.04% / 12.29%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 15:00
Updated-05 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The CleanMyMac X software contains an exploitable privilege escalation vulnerability due to improper input validation. An attacker with local access could use this vulnerability to modify the running kernel extensions on the system.

Action-Not Available
Vendor-macpawn/a
Product-cleanmymac_xClean My Mac
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4037
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.1||HIGH
EPSS-0.04% / 12.29%
||
7 Day CHG~0.00%
Published-10 Jan, 2019 | 15:00
Updated-05 Aug, 2024 | 05:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The CleanMyMac X software contains an exploitable privilege escalation vulnerability due to improper input validation. An attacker with local access can use this vulnerability to modify the file system as root.

Action-Not Available
Vendor-macpawn/a
Product-cleanmymac_xClean My Mac
CWE ID-CWE-20
Improper Input Validation
CVE-2018-4342
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 17.11%
||
7 Day CHG~0.00%
Published-03 Apr, 2019 | 17:43
Updated-05 Aug, 2024 | 05:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A configuration issue was addressed with additional restrictions. This issue affected versions prior to macOS Mojave 10.14.1.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xmacOS
CWE ID-CWE-20
Improper Input Validation
CVE-2022-0317
Matching Score-4
Assigner-Google LLC
ShareView Details
Matching Score-4
Assigner-Google LLC
CVSS Score-4||MEDIUM
EPSS-0.02% / 2.54%
||
7 Day CHG~0.00%
Published-04 Feb, 2022 | 22:33
Updated-21 Apr, 2025 | 13:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Input Validation in AKPublic.Verify in go-attestation

An improper input validation vulnerability in go-attestation before 0.3.3 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing AKPublic.Verify to succeed despite the inconsistency. Subsequent use of the same set of PCR values in Eventlog.Verify lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in Eventlog.Verify to spoof events in the TCG log, hence defeating remotely-attested measured-boot. We recommend upgrading to Version 0.4.0 or above.

Action-Not Available
Vendor-Google LLC
Product-go-attestationgo-attestation
CWE ID-CWE-20
Improper Input Validation
CVE-2015-1319
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-2.1||LOW
EPSS-0.06% / 19.28%
||
7 Day CHG~0.00%
Published-17 Sep, 2015 | 16:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Unity Settings Daemon before 14.04.0+14.04.20150825-0ubuntu2 and 15.04.x before 15.04.1+15.04.20150408-0ubuntu1.2 does not properly detect if the screen is locked, which allows physically proximate attackers to mount removable media while the screen is locked as demonstrated by inserting a USB thumb drive.

Action-Not Available
Vendor-n/aCanonical Ltd.
Product-ubuntu_linuxn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2014-1360
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-2.1||LOW
EPSS-0.07% / 23.03%
||
7 Day CHG~0.00%
Published-01 Jul, 2014 | 10:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lockdown in Apple iOS before 7.1.2 does not properly verify data from activation servers, which makes it easier for physically proximate attackers to bypass the Activation Lock protection mechanism via unspecified vectors.

Action-Not Available
Vendor-n/aApple Inc.
Product-iphone_osn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-29136
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.15% / 35.64%
||
7 Day CHG~0.00%
Published-06 Apr, 2021 | 15:57
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open Container Initiative umoci before 0.4.7 allows attackers to overwrite arbitrary host paths via a crafted image that causes symlink traversal when "umoci unpack" or "umoci raw unpack" is used.

Action-Not Available
Vendor-sylabsn/aThe Linux Foundation
Product-umocisingularityn/a
CWE ID-CWE-20
Improper Input Validation
CVE-2013-4354
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.06% / 18.74%
||
7 Day CHG~0.00%
Published-23 Nov, 2013 | 17:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The API before 2.1 in OpenStack Image Registry and Delivery Service (Glance) makes it easier for local users to inject images into arbitrary tenants by adding the tenant as a member of the image.

Action-Not Available
Vendor-n/aOpenStack
Product-image_registry_and_delivery_service_\(glance\)n/a
CWE ID-CWE-20
Improper Input Validation
CVE-2021-25411
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.01%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 14:33
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper address validation vulnerability in RKP api prior to SMR JUN-2021 Release 1 allows root privileged local attackers to write read-only kernel memory.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-exynos_9610exynos_9810androidexynos_9830exynos_9820Samsung Mobile Devices
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2021-25416
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-6.5||MEDIUM
EPSS-0.03% / 7.05%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 14:33
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Assuming EL1 is compromised, an improper address validation in RKP prior to SMR JUN-2021 Release 1 allows local attackers to create executable kernel page outside code area.

Action-Not Available
Vendor-Google LLCSamsungSamsung Electronics
Product-exynos_9610exynos_9810androidexynos_9830exynos_9820Samsung Mobile Devices
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-20
Improper Input Validation
CVE-2021-0377
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 2.04%
||
7 Day CHG~0.00%
Published-10 Mar, 2021 | 15:59
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In DeltaPerformer::Write of delta_performer.cc, there is a possible use of untrusted input due to improper input validation. This could lead to a local bypass of defense in depth protections with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-160800689

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-20
Improper Input Validation
CVE-2020-8324
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-5||MEDIUM
EPSS-0.06% / 19.43%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 21:05
Updated-16 Sep, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was reported in LenovoAppScenarioPluginSystem for Lenovo System Interface Foundation prior to version 1.2.184.31 that could allow unsigned DLL files to be executed.

Action-Not Available
Vendor-Lenovo Group Limited
Product-system_interface_foundationLenovoAppScenarioPluginSystem for Lenovo System Interface Foundation
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CWE ID-CWE-20
Improper Input Validation
  • Previous
  • 1
  • 2
  • Next
Details not found