
Cloud Vulnerability DB
A community-led vulnerabilities database
In miniadb, there is a possible way to get read/write access to recovery system properties due to an insecure default value. This vulnerability (CVE-2021-39767) affects Android-12L and was identified with Android ID A-201308542. The vulnerability could lead to local escalation of privilege with no additional execution privileges needed, and user interaction is not required for exploitation (Android Bulletin).
The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-1188 (Insecure Default Initialization of Resource). The local attack vector, low attack complexity, and no requirement for user interaction make this vulnerability particularly concerning from a security perspective (NVD).
The vulnerability allows an attacker to gain read/write access to recovery system properties, which could lead to local escalation of privilege. The high CVSS score indicates that successful exploitation could result in significant impact to confidentiality, integrity, and availability of the affected system (NVD).
The vulnerability affects Android-12L systems. Users and administrators should apply the security updates provided through the Android security bulletin to address this vulnerability (Android Bulletin).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."