there is a possible Authentication Bypass due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
History
Tue, 27 Aug 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-787 | |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Google_Devices
Published: 2024-03-11T18:55:34.794Z
Updated: 2024-08-27T14:50:49.938Z
Reserved: 2024-01-03T21:00:57.455Z
Link: CVE-2024-22005

Updated: 2024-08-01T22:35:34.619Z

Status : Awaiting Analysis
Published: 2024-03-11T19:15:47.120
Modified: 2024-11-21T08:55:21.440
Link: CVE-2024-22005

No data.