Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-14110

Summary
Assigner-Xiaomi
Assigner Org ID-b57733aa-7326-4f07-8e09-0be8e0df1909
Published At-18 Jan, 2022 | 16:51
Updated At-04 Aug, 2024 | 12:39
Rejected At-
Credits

AX3600 router sensitive information leaked.There is an unauthorized interface through luci to obtain sensitive information and log in to the web background.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Xiaomi
Assigner Org ID:b57733aa-7326-4f07-8e09-0be8e0df1909
Published At:18 Jan, 2022 | 16:51
Updated At:04 Aug, 2024 | 12:39
Rejected At:
▼CVE Numbering Authority (CNA)

AX3600 router sensitive information leaked.There is an unauthorized interface through luci to obtain sensitive information and log in to the web background.

Affected Products
Vendor
n/a
Product
miwifi6 AX3600
Versions
Affected
  • AX3600 < 1.0.67
Problem Types
TypeCWE IDDescription
textN/AAX3600 router sensitive information leaked
Type: text
CWE ID: N/A
Description: AX3600 router sensitive information leaked
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=40
x_refsource_MISC
Hyperlink: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=40
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=40
x_refsource_MISC
x_transferred
Hyperlink: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=40
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@xiaomi.com
Published At:18 Jan, 2022 | 17:15
Updated At:24 Jan, 2022 | 17:43

AX3600 router sensitive information leaked.There is an unauthorized interface through luci to obtain sensitive information and log in to the web background.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.8HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.04.6MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 7.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 4.6
Base severity: MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Xiaomi
mi
>>ax3600>>-
cpe:2.3:h:mi:ax3600:-:*:*:*:*:*:*:*
Xiaomi
mi
>>ax3600_firmware>>Versions before 1.0.67(exclusive)
cpe:2.3:o:mi:ax3600_firmware:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-863Primarynvd@nist.gov
CWE ID: CWE-863
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=40security@xiaomi.com
Vendor Advisory
Hyperlink: https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=40
Source: security@xiaomi.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

CVE-2020-14111
Matching Score-8
Assigner-Xiaomi Technology Co., Ltd.
ShareView Details
Matching Score-8
Assigner-Xiaomi Technology Co., Ltd.
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.84%
||
7 Day CHG~0.00%
Published-07 Mar, 2022 | 15:24
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A command injection vulnerability exists in the Xiaomi Router AX3600. The vulnerability is caused by a lack of inspection for incoming data detection. Attackers can exploit this vulnerability to execute code.

Action-Not Available
Vendor-n/aXiaomi
Product-ax3600_firmwareax3600Xiaomi Router Router AX3600
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-14106
Matching Score-6
Assigner-Xiaomi Technology Co., Ltd.
ShareView Details
Matching Score-6
Assigner-Xiaomi Technology Co., Ltd.
CVSS Score-5.5||MEDIUM
EPSS-0.23% / 45.80%
||
7 Day CHG~0.00%
Published-08 Apr, 2021 | 20:57
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The application in the mobile phone can unauthorized access to the list of running processes in the mobile phone, Xiaomi Mobile Phone MIUI < 2021.01.26.

Action-Not Available
Vendor-n/aXiaomi
Product-miuiXiaomi Mobile Phone
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-14121
Matching Score-6
Assigner-Xiaomi Technology Co., Ltd.
ShareView Details
Matching Score-6
Assigner-Xiaomi Technology Co., Ltd.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 13.86%
||
7 Day CHG~0.00%
Published-21 Apr, 2022 | 17:25
Updated-04 Aug, 2024 | 12:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A business logic vulnerability exists in Mi App Store. The vulnerability is caused by incomplete permission checks of the products being bypassed, and an attacker can exploit the vulnerability to perform a local silent installation.

Action-Not Available
Vendor-n/aXiaomi
Product-mi_app_storeMi App Store
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-0732
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-1.23% / 78.37%
||
7 Day CHG~0.00%
Published-09 Apr, 2019 | 20:15
Updated-04 Aug, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard when Windows improperly handles calls to the LUAFV driver (luafv.sys), aka 'Windows Security Feature Bypass Vulnerability'.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_7windows_10windows_server_2019windows_server_2008WindowsWindows Server
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-7929
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 5.24%
||
7 Day CHG~0.00%
Published-18 Sep, 2018 | 13:00
Updated-05 Aug, 2024 | 06:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Huawei Mate RS smartphones with the versions before NEO-AL00D 8.1.0.167(C786) have a lock-screen bypass vulnerability. An attacker could unlock and use the phone through certain operations.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-mate_rsmate_rs_firmwareMate RS
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-9374
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.35%
||
7 Day CHG~0.00%
Published-27 Nov, 2024 | 23:42
Updated-18 Dec, 2024 | 20:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In installPackageLI of PackageManagerService.java, there is a possible permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroidandroidpixel
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-22042
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7.8||HIGH
EPSS-0.30% / 52.72%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 16:37
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-esxicloud_foundationVMware ESXi and VMware Cloud Foundation
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-27798
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-7.8||HIGH
EPSS-0.03% / 5.29%
||
7 Day CHG~0.00%
Published-13 May, 2024 | 23:00
Updated-14 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authorization issue was addressed with improved state management. This issue is fixed in macOS Sonoma 14.5. An attacker may be able to elevate privileges.

Action-Not Available
Vendor-Apple Inc.
Product-macosmacOSmacos
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-0552
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-8.8||HIGH
EPSS-0.87% / 74.23%
||
7 Day CHG~0.00%
Published-08 Jan, 2019 | 21:00
Updated-04 Aug, 2024 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An elevation of privilege exists in Windows COM Desktop Broker, aka "Windows COM Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2012windows_8.1windows_rt_8.1windows_10windows_server_2019Windows 10 ServersWindows Server 2012 R2Windows 10Windows 8.1Windows Server 2019Windows RT 8.1Windows Server 2016
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-31644
Matching Score-4
Assigner-HP Inc.
ShareView Details
Matching Score-4
Assigner-HP Inc.
CVSS Score-7.8||HIGH
EPSS-0.10% / 28.65%
||
7 Day CHG~0.00%
Published-14 Jun, 2023 | 17:06
Updated-30 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.

Action-Not Available
Vendor-HP Inc.
Product-zbook_studio_g5_firmwareprodesk_600_g2_desktop_minielitedesk_800_g8_tower_firmwarez2_mini_g5_workstation_firmwareelitebook_845_g8eliteone_1000_g2_23.8-in_all-in-one_business_firmwareprodesk_600_g5_small_form_factorprobook_640_g7zhan_66_pro_g3_24_all-in-oneprodesk_680_g2_microtowerengage_flex_pro-c_retail_systemzhan_66_pro_14_g2probook_630_g8_firmwareelitebook_x360_830_g5_firmwareelitebook_x360_830_g5elitedesk_880_g8_towerelitebook_1040_g3_firmwareprodesk_400_g5_desktop_minielite_x2_1013_g3pro_x360_fortis_g10engage_flex_pro-c_retail_system_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_business_firmwareelite_x360_830_g9_2-in-1_firmwareproone_400_g6_24_all-in-one_firmwareprodesk_400_g5_small_form_factorprobook_445_g6pro_tower_400_g9_firmwareelitebook_840_g7_firmwareprobook_445_g7prodesk_400_g5_desktop_mini_firmwareeliteone_800_g3_23.8-inch_touch_gpu_all-in-onezbook_17_g6probook_650_g8_firmwarezbook_studio_g9elitebook_630_g9_firmwareeliteone_800_g4_23.8-inch_non-touch_gpu_all-in-onezbook_fury_17_g7_firmwareprobook_645_g4_firmwarezhan_66_pro_14_g3elitebook_836_g6prodesk_600_g4_small_form_factorzbook_17_g6_firmwarez2_tower_g8_workstation_firmwareelitedesk_805_g6_small_form_factoreliteone_800_g3_23.8-inch_touch_all-in-one_firmwarez2_tower_g8_workstationz2_tower_g5_workstation_firmwareelitebook_850_g5_firmwareeliteone_800_g3_23.8-inch_non-touch_all-in-oneelite_tower_600_g9_firmwarez2_small_form_factor_g8_workstationelite_slice_g2_firmwareelitebook_x360_1030_g7_firmwareelitedesk_800_g4_tower_firmwareelite_tower_880_g9_firmwarezbook_fury_15_g7prodesk_600_g6_microtower_firmwareelitedesk_800_g8_desktop_mini_firmwarezhan_66_pro_15_g3zbook_power_g9elitedesk_800_g8_small_form_factor_firmwareprodesk_400_g4_desktop_mini_firmwareelitebook_x360_1040_g8_firmwaremt46_mobile_thin_client_firmwareelitebook_865_g9elitedesk_800_g5_desktop_minielitedesk_705_g3probook_x360_11_g6_eeprodesk_405_g6_desktop_mini_firmwareeliteone_1000_g1_23.8-in_all-in-one_businesselitebook_840_g5_firmwareelitedesk_800_65w_g2_desktop_minipro_tower_480_g9prodesk_400_g5_microtower_firmwareelitebook_835_g8eliteone_1000_g2_23.8-in_all-in-one_businesselitebook_x360_1030_g8probook_640_g5proone_600_g3_21.5-inch_non-touch_all-in-one_firmwareprodesk_680_g3_microtowerprodesk_405_g4_small_form_factor_firmwareelitedesk_800_95w_g4_desktop_miniprodesk_600_g2_desktop_mini_firmwareprobook_x360_11_g4_ee_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-one_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_business_firmwareelite_dragonfly_g2elitebook_830_g6z2_small_form_factor_g4_workstationelite_x360_1040_g9_2-in-1probook_430_g6_firmwareeliteone_800_g5_23.8-inch_all-in-oneprobook_650_g5_firmwarez1_entry_tower_g5_workstationprobook_x360_435_g7_firmwareprobook_x360_11_g6_ee_firmwareelite_x2_1012_g2_firmwareproone_400_g4_20-inch_non-touch_all-in-one_business_firmwarezbook_fury_17_g8z1_entry_tower_g5_workstation_firmwareprodesk_400_g6_microtowerelitedesk_800_g4_small_form_factorelitedesk_705_g4_small_form_factor_firmwareprodesk_600_g6_desktop_minielitebook_x360_830_g7probook_445_g7_firmwareelitebook_x360_1040_g8elitedesk_705_g3_firmwareprobook_450_g5probook_450_g6_firmwareprobook_455_g5probook_430_g5_firmwareelitebook_836_g5_firmwareprobook_650_g7_firmwarezbook_17_g5proone_440_g4_23.8-inch_non-touch_all-in-one_business_firmwarezhan_66_pro_15_g3_firmwareproone_400_g4_23.8-inch_non-touch_all-in-one_businessprobook_440_g7elite_folio_2-in-1elitedesk_705_g4_small_form_factorprodesk_400_g4_microtower_firmwareelite_tower_880_g9z2_tower_g5_workstationelitedesk_800_35w_g2_desktop_minielite_x2_1012_g1_firmwareproone_600_g5_21.5-in_all-in-one_business_firmwareelitebook_865_g9_firmwareelite_tower_600_g9proone_400_g3_20-inch_touch_all-in-one_firmwareelitebook_830_g8_firmwareelitedesk_800_g5_tower_firmwareprodesk_600_g3_microtowerprodesk_400_g4_microtowerpro_tower_400_g9prodesk_480_g6_microtower_firmwareelitebook_845_g9zbook_firefly_14_g7zbook_fury_15_g8eliteone_840_23.8_inch_g9_all-in-oneprodesk_405_g6_desktop_miniproone_400_g2_20-inch_touch_all-in-one_firmwaremp9_g4_retail_systemz2_small_form_factor_g5_workstationprobook_445_g8elitebook_855_g7_firmwareelitebook_x360_830_g8probook_470_g5_firmwareelitedesk_805_g8_small_form_factorelitebook_860_g9_firmwareprobook_455_g7elite_tower_800_g9_firmwareproone_400_g2_20-inch_touch_all-in-oneelitebook_x360_830_g6probook_635_aero_g8_firmwareprodesk_405_g4_desktop_mini_firmwareelitebook_835_g9_firmwarepro_sff_400_g9probook_445_g6_firmwareprobook_445_g9proone_440_g6_24_all-in-one_firmwareprodesk_600_g3_desktop_miniz2_small_form_factor_g5_workstation_firmwareelitebook_645_g9_firmwareelitedesk_800_g6_small_form_factorz2_tower_g4_workstationelitedesk_800_65w_g3_desktop_mini_firmwarezbook_studio_g7elitebook_835_g8_firmwareeliteone_800_g4_23.8-in_all-in-one_businesselitedesk_800_g5_desktop_mini_firmwareproone_400_g6_20_all-in-onezbook_fury_15_g7_firmwarezbook_power_g8_firmwareeliteone_800_g3_23.8_non-touch_all-in-one_businessprobook_640_g8_firmwarezbook_14u_g5_firmwareprodesk_480_g6_microtowermt45_mobile_thin_client_firmwareeliteone_1000_g2_27-in_4k_uhd_all-in-one_businessz1_g9_towerprodesk_600_g2_small_form_factorelite_mini_600_g9elitebook_845_g7_firmwareprodesk_600_g4_small_form_factor_firmwarez2_mini_g5_workstationzhan_66_pro_a_14_g5elitebook_1040_g4probook_x360_11_g3_eeelitebook_735_g5eliteone_800_g3_23.8-inch_touch_all-in-oneelitebook_1040_g9_firmwareelitebook_735_g5_firmwareelitedesk_800_g8_desktop_miniprodesk_400_g6_desktop_mini_firmwareelitebook_846_g5_firmwareelite_mini_800_g9zbook_fury_17_g7proone_440_g5_23.8-in_all-in-one_businessprodesk_400_g6_microtower_firmwareprobook_fortis_g10elitebook_835_g7proone_400_g3_20-inch_touch_all-in-onezbook_14u_g6proone_400_g4_20-inch_non-touch_all-in-one_businesselitebook_755_g5zbook_15u_g6_firmwareelitedesk_800_g4_towerprobook_440_g8prodesk_400_g4_desktop_minielitebook_735_g6proone_400_g6_20_all-in-one_firmwareprobook_455_g9elitedesk_800_g2_small_form_factor_firmwareprobook_640_g5_firmwareprobook_440_g6proone_400_g5_23.8-inch_all-in-one_businessprobook_450_g6z1_g8_towerprobook_630_g8probook_650_g8probook_650_g4_firmwarezbook_firefly_15_g8_firmwareprobook_450_g9zhan_x_13_g2zbook_studio_g5proone_600_g2_21.5-inch_non-touch_all-in-oneelitebook_860_g9elitedesk_800_65w_g3_desktop_minieliteone_800_g4_23.8-inch_touch_gpu_all-in-oneelite_x360_830_g9_2-in-1eliteone_1000_g2_34-in_curved_all-in-one_businessprodesk_600_g5_desktop_mini_firmwareprobook_430_g8z2_mini_g4_workstation_firmwaremt44_mobile_thin_clientprodesk_680_g3_microtower_firmwareelitebook_x360_1040_g7elitebook_830_g9elite_x2_g4zbook_15_g5probook_455_g8prodesk_600_g4_microtower_firmwareelitebook_830_g8elitebook_840_g9_firmwareprodesk_400_g7_microtowerprodesk_600_g6_small_form_factor_firmwareelitedesk_800_g6_desktop_mini_firmwarezhan_66_pro_a_14_g4eliteone_1000_g2_23.8-in_touch_all-in-one_business_firmwareelitebook_x360_830_g8_firmwareeliteone_1000_g1_34-in_curved_all-in-one_business_firmwarezhan_66_pro_a_14_g3_firmwareprobook_445_g8_firmwarezhan_66_pro_14_g4elite_dragonfly_g3zhan_66_pro_g3_22_all-in-oneeliteone_800_g3_23.8-inch_touch_gpu_all-in-one_firmwareprobook_455_g5_firmwareprodesk_480_g5_microtower_firmwareengage_one_pro_aio_systemelitebook_830_g7elitebook_640_g9probook_455_g6_firmwareprodesk_600_g4_microtowerprodesk_405_g4_small_form_factormp9_g2_retail_system_firmwareelite_slicez2_mini_g4_workstationelitedesk_705_g4_workstation_firmwareprobook_440_g6_firmwareelitebook_x360_830_g6_firmwareelitebook_830_g6_firmwareelite_tower_680_g9elitedesk_800_65w_g4_desktop_mini_firmwarezhan_66_pro_g1_firmwareeliteone_800_g6_24_all-in-oneelite_x2_g4_firmwareeliteone_800_g4_23.8-inch_non-touch_all-in-one_firmwarezhan_66_pro_13_g2_firmwareelitebook_x360_830_g7_firmwareengage_go_10_mobile_system_firmwareelite_dragonfly_g3_firmwareelite_dragonfly_g2_firmwareprobook_x360_11_g7_eeelitebook_x360_1030_g3_firmwareelitebook_1030_g1elite_mini_800_g9_firmwareelitebook_645_g9zbook_firefly_16_g9_firmwareproone_400_g5_23.8-inch_all-in-one_business_firmwareelite_sff_600_g9elitedesk_705_g4_microtower_firmwarezhan_66_pro_15_g2_firmwarezhan_66_pro_14_g4_firmwarezbook_firefly_15_g7elitedesk_800_35w_g4_desktop_mini_firmwareproone_440_g6_24_all-in-onezbook_power_g9_firmwareelitebook_845_g8_firmwareprobook_640_g8elitebook_830_g9_firmwarezhan_66_pro_g1elitedesk_705_g4_microtowereliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_firmwarerp9_g1_retail_system_firmwareelitebook_840_g7elitebook_1050_g1elitedesk_800_g6_small_form_factor_firmwareengage_one_aio_system_firmwaredragonfly_folio_g3_2-in-1prodesk_400_g7_microtower_firmwareelitebook_850_g5zbook_power_g7elite_mini_600_g9_firmwareeliteone_1000_g1_23.8-in_touch_all-in-one_businesselitebook_630_g9elitebook_x360_1040_g6_firmwareelitebook_x360_1030_g4_firmwareprobook_x360_11_g3_ee_firmwarezhan_66_pro_14_g3_firmwareprodesk_400_g5_microtowerproone_600_g2_21.5-inch_touch_all-in-oneelite_folio_2-in-1_firmwareproone_600_g2_21.5-inch_touch_all-in-one_firmwarezhan_66_pro_a_14_g3elitedesk_800_35w_g3_desktop_mini_firmwarezbook_power_g8probook_440_g8_firmwareelitedesk_880_g5_tower_firmwareprodesk_600_g2_microtowerzbook_15_g6_firmwareelite_sff_800_g9elitedesk_880_g6_tower_firmwareeliteone_1000_g1_27-in_4k_uhd_all-in-one_businessprodesk_600_g4_desktop_minizbook_fury_16_g9proone_400_g3_20-inch_non-touch_all-in-onezbook_create_g7_firmwareproone_440_g4_23.8-inch_non-touch_all-in-one_businessprobook_fortis_g10_firmwareelitebook_840_g5mt46_mobile_thin_clientprobook_440_g5proone_440_23.8_inch_g9_all-in-oneprodesk_600_g2_microtower_firmwareeliteone_800_g6_27_all-in-oneproone_600_g5_21.5-in_all-in-one_businesszhan_66_pro_a_14_g4_firmwarezhan_66_pro_g3_24_all-in-one_firmwareelitebook_1050_g1_firmwareelitebook_755_g5_firmwareelitedesk_800_65w_g2_desktop_mini_firmwaredragonfly_folio_g3_2-in-1_firmwareprobook_640_g4probook_455_g9_firmwareproone_600_g3_21.5-inch_non-touch_all-in-oneprobook_445r_g6_firmwareelitedesk_800_95w_g4_desktop_mini_firmwareprodesk_400_g5_small_form_factor_firmwareprodesk_600_g3_small_form_factor_firmwareprodesk_600_g6_desktop_mini_firmwareprodesk_600_g6_firmwarezhan_66_pro_13_g2elite_dragonflyprobook_440_g5_firmwareprodesk_400_g6_small_form_factor_firmwareprodesk_600_g6_small_form_factorelite_dragonfly_maxeliteone_800_g3_23.8-inch_non-touch_all-in-one_firmwareproone_400_g3_20-inch_non-touch_all-in-one_firmwareelitedesk_800_g6_desktop_minizbook_14u_g6_firmwareprobook_445r_g6mt45_mobile_thin_clientprodesk_400_g6_small_form_factorzbook_15_g6eliteone_800_g8_27_all-in-onez2_small_form_factor_g4_workstation_firmwareelitebook_835_g7_firmwareelitebook_745_g5_firmwareelitebook_850_g6_firmwareelitebook_1040_g3probook_430_g8_firmwareprodesk_405_g6_small_form_factor_firmwareelitedesk_800_g5_towerprobook_fortis_g9_firmwareeliteone_800_g4_23.8-inch_touch_all-in-oneprodesk_405_g4_desktop_miniprobook_470_g5z1_g9_tower_firmwareelite_x2_1012_g1zbook_firefly_16_g9elitebook_840_g8probook_640_g4_firmwareelitebook_846_g5z2_small_form_factor_g8_workstation_firmwareprobook_455r_g6_firmwareproone_600_g4_21.5-inch_touch_all-in-one_business_firmwareelite_x360_1040_g9_2-in-1_firmwareelitedesk_800_g2_small_form_factorelitedesk_800_g6_towerengage_go_mobile_systemeliteone_1000_g2_34-in_curved_all-in-one_business_firmwarezbook_17_g5_firmwareproone_440_23.8_inch_g9_all-in-one_firmwareelitedesk_800_65w_g4_desktop_minielitebook_830_g5prodesk_480_g7_firmwareelitebook_640_g9_firmwareelitebook_x360_1040_g6elitebook_840_g6_firmwarezhan_66_pro_15_g2prodesk_400_g4_small_form_factormt44_mobile_thin_client_firmwareelitebook_735_g6_firmwareelitedesk_805_g6_desktop_minizbook_firefly_14_g7_firmwarez1_entry_tower_g6_workstationelitebook_745_g5probook_440_g9eliteone_800_g2_23-inch_touch_all-in-one_firmwareelitedesk_800_g4_workstationpro_x360_fortis_g9_firmwareelitebook_855_g8elitedesk_705_g4_desktop_mini_firmwareelitebook_1030_g1_firmwareelitedesk_805_g8_desktop_mini_firmwareelitedesk_800_g4_workstation_firmwareelitebook_745_g6_firmwareelite_sff_800_g9_firmwareelitedesk_800_g5_small_form_factor_firmwareelitedesk_880_g5_towerelitedesk_800_g4_small_form_factor_firmwareeliteone_800_g8_24_all-in-one_firmwareeliteone_800_g6_24_all-in-one_firmwareelitebook_836_g6_firmwareelitebook_x360_1030_g7probook_x360_11_g5_eeprobook_440_g9_firmwareelitebook_x360_1040_g7_firmwareprobook_x360_440_g1mp9_g2_retail_systemelitedesk_880_g4_towereliteone_800_g4_23.8-inch_non-touch_all-in-oneelitedesk_880_g8_tower_firmwareelite_tower_800_g9elitebook_x360_1040_g5prodesk_400_g3_desktop_mini_firmwareelitedesk_800_g3_tower_firmwareeliteone_800_g3_23.8-inch_non-touch_gpu_all-in-oneeliteone_840_23.8_inch_g9_all-in-one_firmwarezbook_fury_17_g8_firmwareelitebook_850_g8elitebook_835_g9elite_sff_600_g9_firmwareprodesk_680_g4_microtower_firmwareelitedesk_705_g4_desktop_minielitebook_x360_1030_g4eliteone_800_g6_27_all-in-one_firmwareprodesk_400_g3_desktop_minirp9_g1_retail_systemprodesk_680_g2_microtower_firmwareprobook_x360_440_g1_firmwareprodesk_680_g4_microtowerengage_one_aio_systemzbook_15_g5_firmwareeliteone_800_g2_23-inch_non-touch_all-in-one_firmwarez1_entry_tower_g6_workstation_firmwareprobook_455_g8_firmwareprobook_x360_435_g8probook_640_g7_firmwareelitedesk_805_g6_desktop_mini_firmwareelitebook_840_g6eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_firmwareengage_flex_mini_retail_system_firmwareelitedesk_880_g3_tower_firmwareprobook_455_g6elitebook_850_g8_firmwareelite_x2_g8probook_x360_11_g4_eezbook_studio_g9_firmwareprobook_450_g8elitedesk_800_g3_towereliteone_800_g8_24_all-in-oneelitedesk_705_g5_small_form_factor_firmwarezbook_studio_g8_firmwareprodesk_600_g3_small_form_factorprodesk_480_g7prodesk_600_g5_microtowerelitebook_840_aero_g8_firmwareprodesk_680_g6elite_x2_1012_g2proone_400_g4_23.8-inch_non-touch_all-in-one_business_firmwareprobook_450_g9_firmwareeliteone_1000_g1_34-in_curved_all-in-one_businessprobook_445_g9_firmwareelitebook_840_g9prodesk_600_g5_desktop_miniprodesk_600_g2_small_form_factor_firmwareelitedesk_800_g8_small_form_factorprodesk_400_g7_small_form_factorzbook_studio_x360_g5zbook_15u_g6zbook_studio_x360_g5_firmwareproone_400_g6_24_all-in-oneprodesk_600_g5_small_form_factor_firmwareengage_go_10_mobile_systemprodesk_480_g4_microtowerelitedesk_800_35w_g3_desktop_minizbook_firefly_15_g8eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_firmwareproone_400_g2_20-inch_non-touch_all-in-one_firmwareelite_dragonfly_max_firmwarepro_x360_fortis_g10_firmwareprobook_x360_435_g8_firmwarezbook_studio_g7_firmwarezbook_firefly_15_g7_firmwareeliteone_800_g4_23.8-in_all-in-one_business_firmwareengage_one_pro_aio_system_firmwareprodesk_400_g7_small_form_factor_firmwarezbook_15u_g5elitebook_855_g8_firmwareproone_400_g5_20-inch_all-in-one_business_firmwareeliteone_800_g5_23.8-in_all-in-oneelite_x2_1013_g3_firmwareprobook_x360_435_g7elitedesk_705_g5_desktop_minielitebook_830_g7_firmwareengage_go_mobile_system_firmwarepro_x360_fortis_g9elitebook_850_g6probook_450_g7prodesk_680_g6_firmwareproone_440_g5_23.8-in_all-in-one_business_firmwareproone_600_g6_22_all-in-onezhan_66_pro_a_14_g5_firmwareprobook_450_g7_firmwareeliteone_800_g2_23-inch_non-touch_all-in-onepro_mini_400_g9zbook_fury_15_g8_firmwareelitedesk_800_g8_towerelite_tower_680_g9_firmwareprobook_650_g4zbook_fury_16_g9_firmwareelitedesk_705_g5_small_form_factorprobook_650_g5z2_tower_g4_workstation_firmwareeliteone_1000_g1_23.8-in_all-in-one_business_firmwareelitedesk_800_g3_small_form_factorelitedesk_805_g6_small_form_factor_firmwareprodesk_405_g8_desktop_mini_firmwarezbook_create_g7zhan_66_pro_14_g2_firmwareprodesk_405_g8_small_form_factoreliteone_1000_g2_23.8-in_touch_all-in-one_businessprodesk_405_g8_desktop_minielitebook_745_g6elitebook_650_g9_firmwareprobook_430_g6eliteone_800_g5_23.8-inch_all-in-one_firmwareprodesk_480_g5_microtowerengage_flex_pro_retail_system_firmwareelitebook_1040_g9elitebook_x360_1030_g3zhan_66_pro_g5_firmwareprodesk_600_g5_microtower_firmwarezhan_66_pro_g3_22_all-in-one_firmwareprodesk_480_g4_microtower_firmwareprodesk_600_g6zhan_x_13_g2_firmwareelitedesk_880_g3_towerprodesk_600_g6_microtowerpro_mini_400_g9_firmwareprobook_455r_g6probook_430_g7elitebook_650_g9prodesk_405_g8_small_form_factor_firmwareprobook_450_g8_firmwarepro_sff_400_g9_firmwareelitebook_836_g5elitedesk_880_g4_tower_firmwareproone_600_g2_21.5-inch_non-touch_all-in-one_firmwareproone_400_g5_20-inch_all-in-one_businesselitebook_855_g7elitedesk_800_35w_g2_desktop_mini_firmwareprobook_x360_11_g7_ee_firmwareproone_400_g2_20-inch_non-touch_all-in-oneprodesk_400_g6_desktop_minielitedesk_800_g6_tower_firmwareelitedesk_880_g6_towerprobook_650_g7probook_455_g7_firmwareprodesk_405_g6_small_form_factorelite_dragonfly_firmwareproone_480_g3_20-inch_non-touch_all-in_oneelitebook_840_g8_firmwarepro_tower_480_g9_firmwareelitebook_850_g7zbook_firefly_14_g8elitebook_x360_1040_g5_firmwareprobook_430_g5probook_430_g7_firmwarezbook_power_g7_firmwareelitedesk_705_g5_desktop_mini_firmwareprobook_x360_11_g5_ee_firmwareprodesk_600_g3_microtower_firmwarezbook_firefly_14_g8_firmwareeliteone_800_g5_23.8-in_all-in-one_firmwareelite_slice_g2elitebook_845_g7elitebook_850_g7_firmwareelitebook_655_g9elitebook_1040_g4_firmwareelitebook_840_aero_g8probook_450_g5_firmwareelitedesk_800_35w_g4_desktop_miniprodesk_400_g4_small_form_factor_firmwareelite_x2_g8_firmwareelitedesk_800_g3_small_form_factor_firmwareeliteone_800_g8_27_all-in-one_firmwareproone_480_g3_20-inch_non-touch_all-in_one_firmwarezbook_14u_g5elitebook_x360_1030_g8_firmwarezbook_firefly_14_g9eliteone_1000_g1_23.8-in_touch_all-in-one_business_firmwaremp9_g4_retail_system_firmwareelitebook_840r_g4probook_645_g4elitedesk_800_g5_small_form_factorelite_slice_firmwareelitedesk_705_g4_workstationelitedesk_805_g8_desktop_miniz1_g8_tower_firmwareengage_flex_mini_retail_systemeliteone_800_g4_23.8-inch_touch_all-in-one_firmwarezbook_studio_g8elitebook_845_g9_firmwareprobook_635_aero_g8probook_440_g7_firmwareprodesk_600_g3_desktop_mini_firmwarezbook_15u_g5_firmwareproone_600_g6_22_all-in-one_firmwareelitebook_655_g9_firmwareelitedesk_805_g8_small_form_factor_firmwareengage_flex_pro_retail_systemelitebook_830_g5_firmwareelitebook_840r_g4_firmwarezhan_66_pro_g5eliteone_800_g2_23-inch_touch_all-in-onezbook_firefly_14_g9_firmwareproone_600_g4_21.5-inch_touch_all-in-one_businessprodesk_600_g4_desktop_mini_firmwareprobook_fortis_g9HP PC BIOS
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-0105
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.14% / 33.91%
||
7 Day CHG~0.00%
Published-18 Feb, 2019 | 17:00
Updated-16 Sep, 2024 | 23:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-data_center_managern/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-9488
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.03% / 7.30%
||
7 Day CHG~0.00%
Published-06 Nov, 2018 | 17:00
Updated-17 Sep, 2024 | 01:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the SELinux permissions of crash_dump.te, there is a permissions bypass due to a missing restriction. This could lead to a local escalation of privilege, with System privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0 Android-8.1 Android-9.0 Android ID: A-110107376.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-3560
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-6.08% / 90.39%
||
7 Day CHG~0.00%
Published-16 Feb, 2022 | 00:00
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2023-06-02||Apply updates per vendor instructions.

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-polkit_projectn/aRed Hat, Inc.Canonical Ltd.Debian GNU/Linux
Product-virtualizationvirtualization_hostdebian_linuxpolkitubuntu_linuxenterprise_linuxopenshift_container_platformpolkitPolkit
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CVE-2021-35112
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-8.4||HIGH
EPSS-0.08% / 25.49%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 10:11
Updated-04 Aug, 2024 | 00:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A user with user level permission can access graphics protected region due to improper access control in register configuration in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-qca9377_firmwarewcn3991_firmwaremdm9150_firmwarewsa8830sa6150p_firmwaresa8145p_firmwareqcs610qcs2290_firmwareqca8337wcd9360_firmwarecsra6620qcs4290wcn3950_firmwaresa8150p_firmwaresd765g_firmwareqcs2290qca6595au_firmwareqca6390_firmwarewcd9370csra6620_firmwareqcs605_firmwarecsra6640_firmwareqcs6125_firmwareqca6426wcn3990_firmwareqrb5165n_firmwareqca9377wcn3998wcd9385_firmwareqam8295psdxr2_5g_firmwarewcn3950qsw8573_firmwaresd_8_gen1_5g_firmwaresm6375_firmwarewcn3660bsd662sd460_firmwareqam8295p_firmwaresm7315_firmwareqca6574au_firmwaresdx55_firmwareqca6595ausdx12_firmwarewcd9375_firmwarewcn3998_firmwaremsm8909wsm7250p_firmwareapq8009w_firmwarewcd9360qca6436_firmwarewcn3610_firmwareqrb5165nsd778gsa6155p_firmwarewcn3999sa515m_firmwareqcs6490qrb5165_firmwareqrb5165m_firmwaresd429sdxr2_5gqcs6125sd662_firmwareqcs405wcn3988_firmwaresa6145p_firmwaresd205sd429_firmwaresd778g_firmwarewcd9340sa8195pwsa8810_firmwarequalcomm215_firmwaresd765gsw5100sd765_firmwareqca6436wcn6851wcd9335sa6155pqcs603_firmwareqca6174a_firmwareqcs4290_firmwarewcd9385wcd9341qca6696_firmwareqcs6490_firmwaresd870_firmwarear8035qca6390wcd9375aqt1000sa8150pwcn3910_firmwarewsa8830_firmwaresda429wsd210sd855_firmwaresd865_5g_firmwarewcn3620_firmwareqcm6490sd888_5g_firmwarewcn3988wcn3620wcn6850_firmwarewsa8815_firmwaresa8195p_firmwarewsa8835_firmwaresm8475sa8295p_firmwarewcn6750_firmwarewcn3610qcm6125_firmwareqcm2290_firmwaresm6375wcn3991qca8337_firmwaresda429w_firmwarewcd9380_firmwarewcn3990sdm429wsd780gsw5100psd865_5gsdx24sdx55m_firmwarewcn6856_firmwaresd888qet4101_firmwaremsm8909w_firmwarewsa8835sdm429w_firmwarewcd9380sd888_5gwcn3999_firmwarequalcomm215qcs410qca6574awcn6855_firmwareqca6174asm7325psdx24_firmwarewcd9335_firmwarewcn3980wcn6750qsw8573sa515mqcs605wcd9340_firmwaresd855wsa8815sm7325p_firmwarewcn6850wcn3910sd765qca6426_firmwarewcn3660b_firmwareqca6574a_firmwaresd768g_firmwareqrb5165mwcn3980_firmwaresm7315sd460qca6391sdx55msa8295paqt1000_firmwarewcn6740_firmwarear8031_firmwareqcm4290qcm6490_firmwareqrb5165sd480_firmwareqcs603wcn6851_firmwareqca6574ausa8155p_firmwaresd205_firmwareapq8009wwcd9341_firmwareqcm6125qcm4290_firmwaresd480sd870wcn6855wsa8810sw5100p_firmwaresd210_firmwareqcs610_firmwaremdm9150wcn6856sa6145psd768gar8031qcs405_firmwaresa8145pwcn6740qca6696qca6391_firmwaresd780g_firmwarewcd9370_firmwaresa6150psd888_firmwaresdx55sa8155pcsra6640qet4101sm7250psdx12sw5100_firmwareqcs410_firmwarear8035_firmwareqcm2290Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-8044
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 19.12%
||
7 Day CHG~0.00%
Published-11 Jan, 2021 | 15:36
Updated-05 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys.

Action-Not Available
Vendor-k7computingn/a
Product-total_securityantivriusenterprise_securityultimate_securityn/a
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0376
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.16%
||
7 Day CHG~0.00%
Published-10 Mar, 2021 | 15:57
Updated-03 Aug, 2024 | 15:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In checkUriPermission and related functions of MediaProvider.java, there is a possible way to access external files due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-115619667

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-0694
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.77%
||
7 Day CHG~0.00%
Published-12 Apr, 2022 | 16:11
Updated-03 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In setServiceForegroundInnerLocked of ActiveServices.java, there is a possible way for a background application to regain foreground permissions due to insufficient background restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-183147114

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-8724
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.06% / 17.44%
||
7 Day CHG~0.00%
Published-11 Jan, 2021 | 15:34
Updated-05 Aug, 2024 | 07:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.

Action-Not Available
Vendor-k7computingn/a
Product-total_securityantivriusenterprise_securityultimate_securityn/a
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-7925
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 6.78%
||
7 Day CHG~0.00%
Published-13 Nov, 2018 | 19:00
Updated-05 Aug, 2024 | 06:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The radio module of some Huawei smartphones Emily-AL00A The versions before 8.1.0.171(C00) have a lock-screen bypass vulnerability. An unauthenticated attacker could start third-part input method APP through certain operations to bypass lock-screen by exploit this vulnerability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emily-al00a_firmwareemily-al00aEmily-AL00A
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-7366
Matching Score-4
Assigner-ZTE Corporation
ShareView Details
Matching Score-4
Assigner-ZTE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.04% / 10.73%
||
7 Day CHG~0.00%
Published-28 Dec, 2018 | 16:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE ZXV10 B860AV2.1 product ChinaMobile branch with the ICNT versions up to V1.3.3, the BESTV versions up to V1.2.2, the WASU versions up to V1.1.7 and the MGTV versions up to V1.4.6 have an authentication bypass vulnerability, which may allows an unauthorized user to perform unauthorized operations.

Action-Not Available
Vendor-ZTE Corporation
Product-zxv10_b860av2.1_chinamobile_firmwarezxv10_b860av2.1_chinamobileZXV10 B860AV2.1_ChinaMobile
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-6018
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.07% / 20.99%
||
7 Day CHG+0.01%
Published-23 Jul, 2025 | 14:58
Updated-23 Jul, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Pam-config: lpe from unprivileged to allow_active in pam

A Local Privilege Escalation (LPE) vulnerability has been discovered in pam-config within Linux Pluggable Authentication Modules (PAM). This flaw allows an unprivileged local attacker (for example, a user logged in via SSH) to obtain the elevated privileges normally reserved for a physically present, "allow_active" user. The highest risk is that the attacker can then perform all allow_active yes Polkit actions, which are typically restricted to console users, potentially gaining unauthorized control over system configurations, services, or other sensitive operations.

Action-Not Available
Vendor-Red Hat, Inc.
Product-Red Hat Enterprise Linux 7Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9
CWE ID-CWE-863
Incorrect Authorization
CVE-2010-2525
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.14% / 34.51%
||
7 Day CHG~0.00%
Published-22 Jun, 2021 | 11:39
Updated-07 Aug, 2024 | 02:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was discovered in gfs2 file system’s handling of acls (access control lists). An unprivileged local attacker could exploit this flaw to gain access or execute any file stored in the gfs2 file system.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kernelkernel
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-5199
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.3||HIGH
EPSS-0.01% / 1.04%
||
7 Day CHG~0.00%
Published-11 Jul, 2025 | 23:21
Updated-26 Aug, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LPE on Multipass for macOS

In Canonical Multipass up to and including version 1.15.1 on macOS, incorrect default permissions allow a local attacker to escalate privileges by modifying files executed with administrative privileges by a Launch Daemon during system startup.

Action-Not Available
Vendor-Apple Inc.Canonical Ltd.
Product-multipassmacosMultipass
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-2640
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-7.8||HIGH
EPSS-92.04% / 99.69%
||
7 Day CHG~0.00%
Published-26 Jul, 2023 | 01:59
Updated-23 Oct, 2024 | 14:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.

Action-Not Available
Vendor-Canonical Ltd.
Product-ubuntu_linuxUbuntu Kernelubantu_kernel
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-5343
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7.3||HIGH
EPSS-0.02% / 3.41%
||
7 Day CHG~0.00%
Published-04 May, 2020 | 18:50
Updated-17 Sep, 2024 | 00:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Client platforms restored using a Dell OS recovery image downloaded before December 20, 2019, may contain an insecure inherited permissions vulnerability. A local authenticated malicious user with low privileges could exploit this vulnerability to gain unauthorized access on the root folder.

Action-Not Available
Vendor-Dell Inc.
Product-os_recovery_image_for_microsoft_windows_10CPG SW
CWE ID-CWE-277
Insecure Inherited Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-2257
Matching Score-4
Assigner-Devolutions Inc.
ShareView Details
Matching Score-4
Assigner-Devolutions Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.02% / 2.11%
||
7 Day CHG~0.00%
Published-24 Apr, 2023 | 18:48
Updated-04 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication Bypass in Hub Business integration in Devolutions Workspace Desktop 2023.1.1.3 and earlier on Windows and macOS allows an attacker with access to the user interface to unlock a Hub Business space without being prompted to enter the password via an unimplemented "Force Login" security feature. This vulnerability occurs only if "Force Login" feature is enabled on the Hub Business instance and that an attacker has access to a locked Workspace desktop application configured with a Hub Business space.

Action-Not Available
Vendor-Apple Inc.Microsoft CorporationDevolutions
Product-macoswindowsworkspaceWorkspace Desktop
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-23696
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-7||HIGH
EPSS-0.08% / 24.07%
||
7 Day CHG~0.00%
Published-07 Feb, 2023 | 09:49
Updated-25 Mar, 2025 | 15:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Command Intel vPro Out of Band, versions prior to 4.3.1, contain an Improper Authorization vulnerability. A locally authenticated malicious users could potentially exploit this vulnerability in order to write arbitrary files to the system.

Action-Not Available
Vendor-Dell Inc.
Product-command_\|_intel_vpro_out_of_bandDell Command Intel vPro Out of Band (DCIV)
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2013-2673
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.09% / 26.13%
||
7 Day CHG~0.00%
Published-03 Feb, 2020 | 17:06
Updated-06 Aug, 2024 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Brother MFC-9970CDW 1.10 firmware L devices contain a security bypass vulnerability which allows physically proximate attackers to gain unauthorized access.

Action-Not Available
Vendor-n/aBrother Industries, Ltd.
Product-mfc-9970cdwmfc-9970cdw_firmwaren/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28821
Matching Score-4
Assigner-TIBCO Software Inc.
ShareView Details
Matching Score-4
Assigner-TIBCO Software Inc.
CVSS Score-8.8||HIGH
EPSS-0.13% / 32.71%
||
7 Day CHG~0.00%
Published-23 Mar, 2021 | 20:15
Updated-16 Sep, 2024 | 22:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TIBCO Enterprise Message Service Windows Platform Installation vulnerability

The Windows Installation component of TIBCO Software Inc.'s TIBCO Enterprise Message Service, TIBCO Enterprise Message Service - Community Edition, and TIBCO Enterprise Message Service - Developer Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO Enterprise Message Service: versions 8.5.1 and below, TIBCO Enterprise Message Service - Community Edition: versions 8.5.1 and below, and TIBCO Enterprise Message Service - Developer Edition: versions 8.5.1 and below.

Action-Not Available
Vendor-Microsoft CorporationTIBCO (Cloud Software Group, Inc.)
Product-enterprise_message_servicewindowsTIBCO Enterprise Message ServiceTIBCO Enterprise Message Service - Developer EditionTIBCO Enterprise Message Service - Community Edition
CWE ID-CWE-863
Incorrect Authorization
CVE-2018-21082
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.4||HIGH
EPSS-0.02% / 2.48%
||
7 Day CHG~0.00%
Published-08 Apr, 2020 | 14:48
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with N(7.x) software. Dex Station allows App Pinning bypass and lock-screen bypass via the "Use screen lock type to unpin" option. The Samsung ID is SVE-2017-11106 (February 2018).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28696
Matching Score-4
Assigner-Xen Project
ShareView Details
Matching Score-4
Assigner-Xen Project
CVSS Score-6.8||MEDIUM
EPSS-0.12% / 31.89%
||
7 Day CHG~0.00%
Published-27 Aug, 2021 | 18:46
Updated-03 Aug, 2024 | 21:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IOMMU page mapping issues on x86 T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Both AMD and Intel allow ACPI tables to specify regions of memory which should be left untranslated, which typically means these addresses should pass the translation phase unaltered. While these are typically device specific ACPI properties, they can also be specified to apply to a range of devices, or even all devices. On all systems with such regions Xen failed to prevent guests from undoing/replacing such mappings (CVE-2021-28694). On AMD systems, where a discontinuous range is specified by firmware, the supposedly-excluded middle range will also be identity-mapped (CVE-2021-28695). Further, on AMD systems, upon de-assigment of a physical device from a guest, the identity mappings would be left in place, allowing a guest continued access to ranges of memory which it shouldn't have access to anymore (CVE-2021-28696).

Action-Not Available
Vendor-Debian GNU/LinuxFedora ProjectXen Project
Product-xendebian_linuxfedoraxen
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-28826
Matching Score-4
Assigner-TIBCO Software Inc.
ShareView Details
Matching Score-4
Assigner-TIBCO Software Inc.
CVSS Score-8.8||HIGH
EPSS-0.03% / 6.56%
||
7 Day CHG~0.00%
Published-14 Apr, 2021 | 16:20
Updated-16 Sep, 2024 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge Windows Platform Installation vulnerability

The Windows Installation component of TIBCO Software Inc.'s TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Community Edition and TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Enterprise Edition contains a vulnerability that theoretically allows a low privileged attacker with local access on some versions of the Windows operating system to insert malicious software. The affected component can be abused to execute the malicious software inserted by the attacker with the elevated privileges of the component. This vulnerability results from a lack of access restrictions on certain files and/or folders in the installation. Affected releases are TIBCO Software Inc.'s TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Community Edition: versions 1.3.0 and below and TIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Enterprise Edition: versions 1.3.0 and below.

Action-Not Available
Vendor-Microsoft CorporationTIBCO (Cloud Software Group, Inc.)
Product-windowsmessaging_-_eclipse_mosquitto_distribution_-_bridgeTIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Community EditionTIBCO Messaging - Eclipse Mosquitto Distribution - Bridge - Enterprise Edition
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-20971
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.60%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In removePermission of PermissionManagerServiceImpl.java, there is a possible way to obtain dangerous permissions without user consent due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-27086
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.8||HIGH
EPSS-0.28% / 50.90%
||
7 Day CHG~0.00%
Published-13 Apr, 2021 | 19:32
Updated-03 Aug, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Services and Controller App Elevation of Privilege Vulnerability

Windows Services and Controller App Elevation of Privilege Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2016windows_server_2019windows_10Windows 10 Version 2004Windows Server version 2004Windows 10 Version 1803Windows Server 2019 (Server Core installation)Windows 10 Version 1809Windows Server, version 1909 (Server Core installation)Windows Server 2019Windows Server version 20H2Windows 10 Version 1909Windows 10 Version 20H2
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21390
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.34%
||
7 Day CHG~0.00%
Published-30 Oct, 2023 | 17:01
Updated-05 Sep, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Sim, there is a possible way to evade mobile preference restrictions due to a permission bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21035
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of BackupHelper.java, there is a possible way for an app to get permissions previously granted to another app with the same package name due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-184847040

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-26563
Matching Score-4
Assigner-Synology Inc.
ShareView Details
Matching Score-4
Assigner-Synology Inc.
CVSS Score-8.2||HIGH
EPSS-0.12% / 31.10%
||
7 Day CHG~0.00%
Published-26 Feb, 2021 | 21:45
Updated-14 Jan, 2025 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect authorization vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows local users to execute arbitrary code via unspecified vectors.

Action-Not Available
Vendor-Synology, Inc.
Product-uc3200vs960hd_firmwarevs960hdskynas_firmwarediskstation_manager_unified_controllerdiskstation_managerskynasDiskStation Manager (DSM)
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21225
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 0.27%
||
7 Day CHG~0.00%
Published-28 Jun, 2023 | 00:00
Updated-03 Dec, 2024 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

there is a possible way to bypass the protected confirmation screen due to Failure to lock display power. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-270403821References: N/A

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-20950
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.00% / 0.12%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In AlarmManagerActivity of AlarmManagerActivity.java, there is a possible way to bypass background activity launch restrictions via a pendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-195756028

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21270
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.04% / 11.40%
||
7 Day CHG~0.00%
Published-19 Nov, 2024 | 18:00
Updated-18 Dec, 2024 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way for an app to keep permissions that should be revoked due to incorrect permission flags cleared during an update. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndrioidandroid
CWE ID-CWE-276
Incorrect Default Permissions
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21254
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.44%
||
7 Day CHG~0.00%
Published-12 Jul, 2023 | 23:32
Updated-05 Nov, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In getCurrentState of OneTimePermissionUserManager.java, there is a possible way to hold one-time permissions after the app is being killed due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-20975
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.00% / 0.07%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-25 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In getAvailabilityStatus of EnableContentCapturePreferenceController.java, there is a possible way to bypass DISALLOW_CONTENT_CAPTURE due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-250573776

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21245
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.01% / 2.04%
||
7 Day CHG~0.00%
Published-12 Jul, 2023 | 23:26
Updated-06 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In showNextSecurityScreenOrFinish of KeyguardSecurityContainerController.java, there is a possible way to access the lock screen during device setup due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

Action-Not Available
Vendor-Google LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21034
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-7.8||HIGH
EPSS-0.00% / 0.13%
||
7 Day CHG~0.00%
Published-24 Mar, 2023 | 00:00
Updated-26 Feb, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In multiple functions of SensorService.cpp, there is a possible access of accurate sensor data due to a permissions bypass. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-230358834

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2009-0034
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.8||HIGH
EPSS-0.05% / 14.68%
||
7 Day CHG~0.00%
Published-30 Jan, 2009 | 19:00
Updated-07 Aug, 2024 | 04:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.

Action-Not Available
Vendor-gratisoftn/aVMware (Broadcom Inc.)
Product-esxsudon/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-21117
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-8.4||HIGH
EPSS-0.00% / 0.10%
||
7 Day CHG~0.00%
Published-15 May, 2023 | 00:00
Updated-31 Jan, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In registerReceiverWithFeature of ActivityManagerService.java, there is a possible way for isolated processes to register a broadcast receiver due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-263358101

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-1796
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.6||MEDIUM
EPSS-0.06% / 17.05%
||
7 Day CHG~0.00%
Published-20 Mar, 2020 | 14:54
Updated-04 Aug, 2024 | 06:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an improper authorization vulnerability in several smartphones. The software incorrectly performs an authorization to certain user, successful exploit could allow a low privilege user to do certain operation which the user are supposed not to do.Affected product versions include:HUAWEI Mate 20 versions Versions earlier than 10.0.0.188(C00E74R3P8);HUAWEI Mate 30 Pro versions Versions earlier than 10.0.0.203(C00E202R7P2).

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-mate_30_promate_30_pro_firmwaremate_20mate_20_firmwareHUAWEI Mate 20;HUAWEI Mate 30 Pro
CWE ID-CWE-863
Incorrect Authorization
CVE-2025-0360
Matching Score-4
Assigner-Axis Communications AB
ShareView Details
Matching Score-4
Assigner-Axis Communications AB
CVSS Score-7.8||HIGH
EPSS-0.02% / 3.83%
||
7 Day CHG~0.00%
Published-04 Mar, 2025 | 05:24
Updated-26 Mar, 2025 | 12:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API.

Action-Not Available
Vendor-Axis Communications AB
Product-AXIS OS
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-1164
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.4||HIGH
EPSS-0.04% / 8.71%
||
7 Day CHG~0.00%
Published-03 Mar, 2023 | 06:56
Updated-25 Nov, 2024 | 15:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
KylinSoft kylin-activation File Import improper authorization

A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.

Action-Not Available
Vendor-kylinosKylinSoft
Product-kylin_oskylin-activation
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-7457
Matching Score-4
Assigner-Pentraze Cybersecurity
ShareView Details
Matching Score-4
Assigner-Pentraze Cybersecurity
CVSS Score-7.8||HIGH
EPSS-0.01% / 1.99%
||
7 Day CHG~0.00%
Published-10 Jun, 2025 | 23:19
Updated-12 Jun, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
macOS Stash network-management utility: Unauthorized Manipulation of System Network Preferences

The ws.stash.app.mac.daemon.helper tool contains a vulnerability caused by an incorrect use of macOS’s authorization model. Instead of validating the client's authorization reference, the helper invokes AuthorizationCopyRights() using its own privileged context (root), effectively authorizing itself rather than the client. As a result, it grants the system.preferences.admin right internally, regardless of the requesting client's privileges. This flawed logic allows unprivileged clients to invoke privileged operations via XPC, including unauthorized changes to system-wide network preferences such as SOCKS, HTTP, and HTTPS proxy settings. The absence of proper code-signing checks further enables arbitrary processes to exploit this flaw, leading to man-in-the-middle (MITM) attacks through traffic redirection.

Action-Not Available
Vendor-Stash
Product-Stash
CWE ID-CWE-863
Incorrect Authorization
Details not found