Vulnerability Details : CVE-2020-0031
In triggerAugmentedAutofillLocked and related functions of Session.java, it is possible for Augmented Autofill to display sensitive information to the user inappropriately. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-141703197
Published
2020-03-10 20:15:21
Updated
2020-03-11 12:47:23
Vulnerability category: Information leak
Products affected by CVE-2020-0031
- cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-0031
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-0031
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:N/A:N |
3.4
|
6.9
|
NIST | |
5.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
1.3
|
3.6
|
NIST |
CWE ids for CVE-2020-0031
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-0031
-
https://source.android.com/security/bulletin/2020-03-01
Android Security Bulletin—March 2020 | Android Open Source ProjectVendor Advisory
Jump to