Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-7257

Summary
Assigner-Zyxel
Assigner Org ID-96e50032-ad0d-4058-a115-4d2c13821f9f
Published At-12 May, 2026 | 03:31
Updated At-12 May, 2026 | 12:48
Rejected At-
Credits

** UNSUPPORTED WHEN ASSIGNED ** An insecure storage of sensitive information vulnerability in the configuration file of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow a local attacker with administrator privileges to download and decrypt a backup configuration file.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Zyxel
Assigner Org ID:96e50032-ad0d-4058-a115-4d2c13821f9f
Published At:12 May, 2026 | 03:31
Updated At:12 May, 2026 | 12:48
Rejected At:
▼CVE Numbering Authority (CNA)

** UNSUPPORTED WHEN ASSIGNED ** An insecure storage of sensitive information vulnerability in the configuration file of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow a local attacker with administrator privileges to download and decrypt a backup configuration file.

Affected Products
Vendor
Zyxel Networks CorporationZyxel
Product
WRE6505 v2 firmware
Default Status
unaffected
Versions
Affected
  • V1.00(ABDV.3)C0
Problem Types
TypeCWE IDDescription
CWECWE-922CWE-922: Insecure Storage of Sensitive Information
Type: CWE
CWE ID: CWE-922
Description: CWE-922: Insecure Storage of Sensitive Information
Metrics
VersionBase scoreBase severityVector
3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.zyxel.com/global/en/support/end-of-life
N/A
Hyperlink: https://www.zyxel.com/global/en/support/end-of-life
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@zyxel.com.tw
Published At:12 May, 2026 | 04:16
Updated At:16 May, 2026 | 03:08

** UNSUPPORTED WHEN ASSIGNED ** An insecure storage of sensitive information vulnerability in the configuration file of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow a local attacker with administrator privileges to download and decrypt a backup configuration file.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.4MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 4.4
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Zyxel Networks Corporation
zyxel
>>wre6505_firmware>>v1.00\(abdv.3\)c0
cpe:2.3:o:zyxel:wre6505_firmware:v1.00\(abdv.3\)c0:*:*:*:*:*:*:*
Zyxel Networks Corporation
zyxel
>>wre6505>>v2
cpe:2.3:h:zyxel:wre6505:v2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-922Primarysecurity@zyxel.com.tw
CWE ID: CWE-922
Type: Primary
Source: security@zyxel.com.tw
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.zyxel.com/global/en/support/end-of-lifesecurity@zyxel.com.tw
Product
Hyperlink: https://www.zyxel.com/global/en/support/end-of-life
Source: security@zyxel.com.tw
Resource:
Product

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2022-45440
Matching Score-8
Assigner-Zyxel Corporation
ShareView Details
Matching Score-8
Assigner-Zyxel Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.14% / 33.39%
||
7 Day CHG~0.00%
Published-17 Jan, 2023 | 00:00
Updated-17 Dec, 2025 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists in the FTP server of the Zyxel AX7501-B0 firmware prior to V5.17(ABPC.3)C0, which processes symbolic links on external storage media. A local authenticated attacker with administrator privileges could abuse this vulnerability to access the root file system by creating a symbolic link on external storage media, such as a USB flash drive, and then logging into the FTP server on a vulnerable device.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-ax7501-b0ax7501-b0_firmwareAX7501-B0 firmware
CWE ID-CWE-59
Improper Link Resolution Before File Access ('Link Following')
CVE-2025-20886
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-4.1||MEDIUM
EPSS-0.07% / 22.56%
||
7 Day CHG~0.00%
Published-04 Feb, 2025 | 07:19
Updated-25 Mar, 2025 | 06:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inclusion of sensitive information in test code in softsim trustlet prior to SMR Jan-2025 Release 1 allows local privileged attackers to get test key.

Action-Not Available
Vendor-Samsung ElectronicsSamsung
Product-androidSamsung Mobile Devices
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2024-28132
Matching Score-4
Assigner-F5, Inc.
ShareView Details
Matching Score-4
Assigner-F5, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.05% / 16.16%
||
7 Day CHG~0.00%
Published-08 May, 2024 | 15:01
Updated-06 Aug, 2025 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BIG-IP NEXT CNF vulnerability

Exposure of Sensitive Information vulnerability exists in the GSLB container, which may allow an authenticated attacker with local access to view sensitive information.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Action-Not Available
Vendor-F5, Inc.
Product-big-ip_next_cloud-native_network_functionsBIG-IP Next CNF
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2024-20050
Matching Score-4
Assigner-MediaTek, Inc.
ShareView Details
Matching Score-4
Assigner-MediaTek, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.01% / 2.12%
||
7 Day CHG~0.00%
Published-01 Apr, 2024 | 02:35
Updated-23 Apr, 2025 | 13:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In flashc, there is a possible information disclosure due to an uncaught exception. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541757; Issue ID: ALPS08541757.

Action-Not Available
Vendor-rdkcentralMediaTek Inc.Google LLCOpenWrtThe Linux Foundation
Product-mt6980mt6890mt8765mt6835mt6855mt8788mt8796mt8167mt8385mt6886mt8195mt6985mt8766mt8395rdk-bmt8786mt6983mt6789mt8798mt6990mt8673mt8365mt2713mt8173mt6879mt2737mt8362amt6989openwrtmt8321mt8791tmt8175mt8797mt8781mt8168mt6781mt8188mt8666mt8667yoctomt8791mt8390mt8768mt8789androidmt6895mt6880MT2713, MT2737, MT6781, MT6789, MT6835, MT6855, MT6879, MT6880, MT6886, MT6890, MT6895, MT6980, MT6983, MT6985, MT6989, MT6990, MT8167, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8796, MT8797, MT8798
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2022-38090
Matching Score-4
Assigner-Intel Corporation
ShareView Details
Matching Score-4
Assigner-Intel Corporation
CVSS Score-6||MEDIUM
EPSS-0.04% / 12.52%
||
7 Day CHG~0.00%
Published-16 Feb, 2023 | 20:00
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper isolation of shared resources in some Intel(R) Processors when using Intel(R) Software Guard Extensions may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-celeron_n2815core_i5-10200hcore_i5-10500hcore_i3-10100yxeon_platinum_8380core_i3-10110yceleron_n4020_firmwarecore_i7-9700f_firmwareceleron_n4100_firmwarecore_i3-10300t_firmwarecore_i3-9320core_i7-10750hcore_i5-10505_firmwarecore_i3-1005g1_firmwarexeon_gold_6328hcore_i5-10500eceleron_n6211_firmwarexeon_gold_5317xeon_platinum_8362core_i7-9700celeron_n2806core_i5-9500e_firmwarexeon_gold_6312ucore_i5-9400_firmwarecore_i5-9400fcore_i7-1065g7_firmwareceleron_n2806_firmwarexeon_gold_6354core_i3-10100txeon_gold_5318n_firmwarecore_i3-9350kfxeon_platinum_8351nxeon_gold_6330nceleron_n2930core_i3-9300t_firmwareceleron_j3355core_i5-10310y_firmwarexeon_gold_5320hcore_i5-9500tceleron_n6210_firmwarexeon_platinum_8351n_firmwarecore_i5-9500fcore_i5-1030g7celeron_j1750_firmwarexeon_gold_6338tcore_i9-10900eceleron_n3160core_i7-10510ycore_i9-9900celeron_n3060celeron_j3060_firmwarecore_i9-10900e_firmwarecore_i3-10105f_firmwareceleron_n4000_firmwarecore_i5-9600kf_firmwarexeon_gold_6348xeon_gold_6330n_firmwarecore_i5-10400f_firmwarecore_i9-10900_firmwareceleron_n2820_firmwareceleron_n2910_firmwarecore_i5-10600kfcore_i3-10305t_firmwarexeon_gold_6348h_firmwarexeon_silver_4310tcore_i3-10325_firmwareceleron_n2830core_i9-10900kfxeon_platinum_8380_firmwarecore_i3-10305tcore_i7-10850h_firmwarecore_i9-10900k_firmwareceleron_j1900_firmwarecore_i9-10980hk_firmwareceleron_j6413_firmwarecore_i5-1035g4core_i9-10900xeon_gold_6338nxeon_silver_4316core_i7-9700kxeon_gold_6326_firmwarexeon_gold_6354_firmwarecore_i5-10600kxeon_gold_5318s_firmwarecore_i5-1035g4_firmwareceleron_j4125_firmwarecore_i7-10700kf_firmwarexeon_platinum_8380h_firmwareceleron_n2807_firmwarecore_i5-10300hcore_i5-9400t_firmwareceleron_n2840_firmwarecore_i3-10105celeron_j4005_firmwarecore_i5-10500texeon_gold_6342core_i3-10105_firmwarecore_i7-10610u_firmwarecore_i5-9500te_firmwarecore_i7-9750hcore_i9-10900t_firmwarecore_i7-10700ecore_i9-10980hkcore_i5-10500t_firmwarecore_i7-9700_firmwarecore_i3-9100te_firmwarecore_i3-9100tecore_i7-10870h_firmwarecore_i7-1068ng7core_i7-9700t_firmwarecore_i5-10210uxeon_gold_6328hl_firmwarecore_i5-10500h_firmwareceleron_n4000core_i9-9880hcore_i7-9700te_firmwarecore_i3-10305_firmwareceleron_j1850_firmwareceleron_n2830_firmwarexeon_gold_6334core_i3-9100f_firmwarecore_i5-10310u_firmwarecore_i5-9500_firmwarecore_i5-10500e_firmwarecore_i3-10100eceleron_n3350_firmwareceleron_j1800core_i7-1068ng7_firmwarecore_i9-9900kfcore_i5-10400fxeon_platinum_8376hl_firmwarecore_i3-9100e_firmwarexeon_gold_5318nxeon_platinum_8376hcore_i9-10900tecore_i3-10100core_i3-10110y_firmwarepentium_silver_j5040celeron_n3000_firmwareceleron_n4020core_i9-10900kf_firmwarepentium_silver_j5005celeron_n4120core_i7-9750h_firmwarecore_i7-9750hf_firmwarecore_i5-9400h_firmwarexeon_gold_6346xeon_platinum_8380hcore_i3-10110ucore_i7-10850hxeon_gold_6326core_i7-10875hcore_i5-1035g1celeron_n5100_firmwareceleron_n2810core_i5-10400t_firmwarecore_i3-10110u_firmwarecore_i5-9600t_firmwarecore_i5-10400_firmwarecore_i5-10210u_firmwarexeon_gold_5320h_firmwarexeon_gold_5315y_firmwarecore_i5-10500_firmwareceleron_j6412_firmwarecore_i3-9100_firmwarecore_i3-10305core_i7-10700k_firmwarexeon_platinum_8360yxeon_gold_5318yceleron_j6413core_i5-1035g7core_i9-10900kxeon_gold_6314u_firmwarecore_i3-9100epentium_silver_n5000_firmwareceleron_n4505core_i5-9500ecore_i7-10710ucore_i5-10310yceleron_j3355e_firmwarexeon_silver_4314_firmwarexeon_platinum_8352yceleron_n4120_firmwarecore_i7-10700f_firmwarexeon_gold_6338xeon_platinum_8353hcore_i5-9500t_firmwareceleron_n2805core_i7-1065g7core_i5-9600kfxeon_platinum_8362_firmwarecore_i9-9900kceleron_j3455_firmwareceleron_n5100xeon_gold_6342_firmwarecore_i5-9300hxeon_platinum_8376hlcore_i5-9600_firmwareceleron_n3150_firmwarecore_i3-9100t_firmwarexeon_gold_6348hcore_i3-1000g4xeon_gold_5318y_firmwarexeon_platinum_8368qcore_i7-9700fcore_i3-1000g1_firmwarexeon_platinum_8358xeon_gold_6314uxeon_platinum_8352mcore_i7-10700t_firmwarecore_i5-9300h_firmwarecore_i5-10500txeon_gold_5318h_firmwareceleron_n2807core_i3-10100fxeon_platinum_8358_firmwareceleron_n2810_firmwarecore_i5-10600k_firmwareceleron_j3060celeron_n2840xeon_silver_4314xeon_gold_6336y_firmwarexeon_platinum_8360hl_firmwareceleron_n3050xeon_platinum_8360hcore_i7-9850h_firmwarecore_i5-9300hf_firmwarecore_i3-10300core_i7-10700core_i7-10810upentium_silver_n6005xeon_gold_6336ycore_i7-10700_firmwarecore_i3-1000g4_firmwarecore_i9-9980hk_firmwarecore_i3-9350kceleron_n3350core_i5-10210yxeon_gold_5318hxeon_platinum_8354h_firmwareceleron_n2920_firmwarepentium_silver_n6000core_i9-10850k_firmwarecore_i7-10700te_firmwarexeon_gold_5315yceleron_n3350ecore_i7-10700kceleron_n5105_firmwarecore_i3-9300xeon_silver_4310core_i3-10300_firmwarecore_i9-9900tcore_i5-10400xeon_gold_6338_firmwarecore_i5-9500tecore_i7-10700e_firmwarecore_i9-9900_firmwarecore_i9-9900t_firmwarexeon_platinum_8368q_firmwarepentium_silver_j5040_firmwarexeon_gold_5320tcore_i5-10300h_firmwarecore_i3-10320core_i3-1005g1core_i5-10500celeron_n4100celeron_n2805_firmwarexeon_gold_6330h_firmwarecore_i7-10870hcore_i3-9350kf_firmwareceleron_j3355epentium_silver_j5005_firmwareceleron_n3010_firmwarecore_i7-10510u_firmwarexeon_gold_6330_firmwareceleron_n3000core_i7-10700tecore_i5-9600k_firmwareceleron_n2940xeon_platinum_8368core_i7-9700kf_firmwarecore_i5-9400hxeon_gold_5320t_firmwarecore_i9-10850kcore_i5-1038ng7_firmwarexeon_gold_6330hxeon_platinum_8352score_i5-10600kf_firmwareceleron_n3160_firmwareceleron_j3355_firmwarexeon_platinum_8352vxeon_platinum_8360hlcore_i9-9900ksxeon_gold_6348_firmwareceleron_j3455celeron_j4025xeon_gold_6328h_firmwarexeon_platinum_8380hlxeon_platinum_8368_firmwareceleron_n2930_firmwarecore_i7-9850hecore_i9-9880h_firmwarecore_i7-9700e_firmwarecore_i3-9350k_firmwarecore_i5-10200h_firmwarecore_i7-1060g7_firmwarecore_i3-9100hlpentium_silver_n6005_firmwarecore_i3-10100t_firmwarecore_i9-10900te_firmwarecore_i5-10600core_i7-9700ecore_i5-10400hcore_i3-10320_firmwarecore_i5-1035g1_firmwarexeon_gold_6334_firmwarecore_i3-9100hl_firmwarecore_i5-10400tceleron_n4500_firmwarecore_i9-10885hcore_i9-9900ks_firmwarexeon_platinum_8356hcore_i3-9320_firmwareceleron_n3010celeron_j4125celeron_n2910celeron_j1750xeon_platinum_8352s_firmwarexeon_gold_5318score_i5-1030g4_firmwarecore_i5-9400f_firmwarecore_i5-9600kcore_i3-10300tcore_i5-9600tceleron_n2815_firmwarecore_i5-10600_firmwarecore_i7-9850he_firmwarecore_i7-10700txeon_silver_4309yceleron_n6210core_i5-9400tcore_i9-10900f_firmwarecore_i3-10100te_firmwarecore_i9-9980hkcore_i3-10105fxeon_platinum_8360y_firmwarecore_i7-10510uceleron_n2920xeon_gold_6330celeron_n3450core_i7-9750hfcore_i3-10325core_i5-9600core_i3-9300_firmwarecore_i7-1060g7celeron_n4505_firmwarecore_i7-9700txeon_platinum_8380hl_firmwarecore_i7-10510y_firmwarecore_i3-10100tecore_i7-10700kfcore_i9-10900tcore_i5-10400h_firmwarecore_i7-10610ucore_i3-9100txeon_platinum_8352v_firmwarecore_i3-10100f_firmwarexeon_silver_4316_firmwareceleron_j4105xeon_gold_6346_firmwareceleron_j3160_firmwarecore_i7-10750h_firmwarecore_i3-10105tceleron_n2940_firmwarecore_i5-10210y_firmwarecore_i3-10100e_firmwareceleron_n3450_firmwareceleron_n6211core_i9-10900fceleron_n3050_firmwarecore_i7-9700k_firmwarecore_i5-10310ucore_i5-1030g4celeron_j1850celeron_n3060_firmwarecore_i7-9700kfcore_i3-10105t_firmwareceleron_j1900celeron_n2820core_i5-1035g7_firmwarecore_i9-10885h_firmwarexeon_platinum_8376h_firmwarecore_i9-9900k_firmwarexeon_silver_4310_firmwarexeon_platinum_8352m_firmwarexeon_gold_6312u_firmwarexeon_platinum_8354hxeon_platinum_8358pcore_i3-9100xeon_gold_6338n_firmwarexeon_gold_5320xeon_silver_4310t_firmwareceleron_j1800_firmwarexeon_platinum_8356h_firmwarexeon_platinum_8353h_firmwarecore_i5-9500core_i7-10810u_firmwarecore_i5-10505core_i9-9900kf_firmwarexeon_platinum_8358p_firmwarecore_i5-9500f_firmwarecore_i3-9300tceleron_n3150core_i5-9300hfxeon_gold_5320_firmwareceleron_j4005core_i7-10710u_firmwarecore_i5-10500te_firmwareceleron_j6412celeron_n3350e_firmwarepentium_silver_n5030_firmwarecore_i3-9100fcore_i3-10100y_firmwareceleron_n2808celeron_n2808_firmwareceleron_j4105_firmwarecore_i7-9700teceleron_j4025_firmwarecore_i7-9850hpentium_silver_n5030celeron_j3455e_firmwarecore_i5-10600t_firmwarecore_i3-1000g1celeron_n5105xeon_gold_6328hlxeon_gold_5317_firmwarecore_i7-10875h_firmwarepentium_silver_n6000_firmwareceleron_j3160xeon_gold_6338t_firmwarecore_i5-1038ng7core_i5-10600txeon_platinum_8360h_firmwarecore_i5-9400pentium_silver_n5000xeon_silver_4309y_firmwarecore_i7-9850hlcore_i3-10100_firmwarecore_i7-10700fceleron_n4500celeron_j3455exeon_platinum_8352y_firmwarecore_i5-1030g7_firmwarecore_i7-9850hl_firmwareIntel(R) Processors with Intel(R) Software Guard Extensions (SGX)
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2020-9202
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 8.99%
||
7 Day CHG~0.00%
Published-24 Dec, 2020 | 15:42
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an information disclosure vulnerability in TE Mobile software versions V600R006C10,V600R006C10SPC100. Due to the improper storage of some information in certain specific scenario, the attacker can gain information in the victim's device to launch the attack, successful exploit could cause information disclosure.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-te_mobileTE Mobile
CWE ID-CWE-922
Insecure Storage of Sensitive Information
CVE-2019-9253
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
ShareView Details
Matching Score-4
Assigner-Android (associated with Google Inc. or Open Handset Alliance)
CVSS Score-4.4||MEDIUM
EPSS-0.02% / 3.78%
||
7 Day CHG~0.00%
Published-27 Sep, 2019 | 18:05
Updated-04 Aug, 2024 | 21:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In KeyStore, there is a possible storage of symmetric keys in the TEE instead of the strongbox due to a missing strongbox flag. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-109769728

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidAndroid
CWE ID-CWE-922
Insecure Storage of Sensitive Information
Details not found