
Cloud Vulnerability DB
A community-led vulnerabilities database
In Media, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This vulnerability (CVE-2021-39761) affects Android 12L. The issue could lead to local information disclosure with no additional execution privileges needed and requires no user interaction for exploitation (Android Bulletin).
The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (MEDIUM) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N. Under CVSS v2.0, it received a Base Score of 2.1 (LOW) with vector (AV:L/AC:L/Au:N/C:P/I:N/A:N). The vulnerability is classified under CWE-203 (Observable Discrepancy) (NVD).
The vulnerability allows an attacker to determine whether specific apps are installed on the device without having the necessary query permissions. This represents a privacy concern as it enables unauthorized access to information about installed applications through side channel information disclosure (Android Bulletin).
The vulnerability was addressed in Android 12L security updates. Users should ensure their devices are updated to the latest available security patch level to mitigate this vulnerability (Android Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."