7.2
CVSSv2

CVE-2020-0001

Published: 08/01/2020 Updated: 21/07/2021
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 643
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In getProcessRecordLocked of ActivityManagerService.java isolated apps are not handled correctly. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.0, Android-8.1, Android-9, and Android-10 Android ID: A-140055304

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

google android 8.0

google android 8.1

google android 9.0

google android 10.0

Github Repositories

PoC for CVE-2021-39749, allowing starting arbitrary Activity on Android 12L Beta

This is PoC for CVE-2021-39749, which allows starting activities of other apps on Android 12L Beta regardless of their permission and exported settings In Android 12L TaskFragmentOrganizer access (intentionally) no longer requires MANAGE_ACTIVITY_TASKS permission Using app provided here requires disabling Hidden API Checks, you can do so through adb shell settings put global hi

Utilities for manipulating CVSS vulnerability metric

CVSS A utility for reporting and manipulating CVSS v3 metrics The motivation for this tool came from looking for a simple command line tool to report the CVSS base score metric for a given CVE and asking the question 'how does that score apply in my environment' The CVSS V3 specification includes a modify base score string to address this question This utility extra

Markdown Badges for github to display a CVE

CVE badge for Github / Markdown Summary This online tool allows you to add a CVE Badge to your repository The only thing to do is to place the following line in markdown file in order to include the CVE badge Replace the id with your CVE ID ![cve](cve-badgeli/CVE-2023-0732) On Stackoverflow or other platform, the link can be a

POC to run system component in an untrusted-app process

CVE-2020-0001 POC to run system component in an untrusted-app process Blog zachiniocom/blogs/cve-2020-0001 How to use Run the app, make sure the process "comandroidsettings" does not exist, and click the "start service" button Launch the settings app or wait for a system component to launch it for you

A Ruby library for parsing the CVE JSON in the cvelist git repository

cvelist Homepage Issues Documentation Description A Ruby library for parsing the CVE JSON in the cvelist git repository Features Supports downloading/updating cvelist Git repository Supports CVE JSON Schema v40 Uses multi_json for configurable JSON parser Examples require 'cvelist' Cloning the cvelist repository: repo