A vulnerability, which was classified as critical, has been found in Samsung Devices. Affected by this vulnerability is the function com.samsung.android.wifi.GEOFENCE of the component SLocation. This manipulation causes improper access controls.
This vulnerability is tracked as CVE-2023-21469. The attack is restricted to local execution. No exploit exists.
To fix this issue, it is recommended to deploy a patch.
A vulnerability, which was classified as critical, was found in Samsung Devices. Affected by this issue is the function com.samsung.android.wifi.NETWORK_LOCATION of the component SLocation. Such manipulation leads to improper access controls.
This vulnerability is listed as CVE-2023-21470. The attack must be carried out locally. There is no available exploit.
It is advisable to implement a patch to correct this issue.
A vulnerability was found in Samsung Devices. It has been classified as critical. This issue affects some unknown processing of the component SemClipboard. The manipulation leads to improper access controls.
This vulnerability is documented as CVE-2023-21471. The attack needs to be performed locally. There is not any exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability was found in Samsung Devices. It has been rated as critical. The affected element is an unknown function of the component Exynos Fastboot USB Interface. This manipulation causes improper input validation.
This vulnerability appears as CVE-2023-21472. It is feasible to perform the attack on the physical device. There is no available exploit.
It is suggested to install a patch to address this issue.
A vulnerability categorized as critical has been discovered in Samsung Devices. The impacted element is an unknown function of the component Exynos Fastboot USB Interface. Such manipulation leads to improper input validation.
This vulnerability is traded as CVE-2023-21473. The attack can be executed directly on the physical device. There is no exploit available.
A patch should be applied to remediate this issue.
A vulnerability, which was classified as critical, has been found in Google Android 12.0/13.0. This affects the function inflate of the file inflate.c. Performing manipulation results in out-of-bounds write.
This vulnerability is cataloged as CVE-2023-21100. The attack must be initiated from a local position. There is no exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability has been found in Samsung Devices and classified as problematic. This affects an unknown part of the component 3GPP. Performing manipulation results in cryptographic issues.
This vulnerability is cataloged as CVE-2023-21467. The attack must originate from the local network. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
A vulnerability was found in Samsung Devices and classified as critical. This vulnerability affects unknown code of the component Telephony. Executing manipulation can lead to improper access controls.
This vulnerability is registered as CVE-2023-21468. The attack needs to be launched locally. No exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability was found in Samsung Devices. It has been declared as critical. Impacted is an unknown function of the component CertificatePolicy. The manipulation results in permission issues.
This vulnerability is reported as CVE-2023-21466. The attack requires a local approach. No exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability classified as problematic was found in Google Android 11.0/12.0/13.0. Affected by this issue is some unknown functionality of the file PackageInstallerSession.java. Such manipulation leads to Local Privilege Escalation.
This vulnerability is listed as CVE-2023-21099. The attack must be carried out locally. There is no available exploit.
A patch should be applied to remediate this issue.