Vulnerability Details : CVE-2021-0973
In isFileUri of UriUtil.java, there is a possible way to bypass ignoring file://URI attachment due to improper handling of case sensitivity. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-197328178
Published
2021-12-15 19:15:12
Updated
2021-12-17 17:55:49
Vulnerability category: Information leak
Products affected by CVE-2021-0973
- cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-0973
0.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 2 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-0973
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:P/I:N/A:N |
3.4
|
2.9
|
NIST | |
5.0
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
1.3
|
3.6
|
NIST |
CWE ids for CVE-2021-0973
-
The product does not properly account for differences in case sensitivity when accessing or determining the properties of a resource, leading to inconsistent results.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-0973
-
https://source.android.com/security/bulletin/pixel/2021-12-01
Pixel Update Bulletin—December 2021 | Android Open Source ProjectPatch;Vendor Advisory
Jump to