
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability affects the Messaging ("com.android.mms") app patched by LG, specifically in the exported "com.android.mms.ui.QClipIntentReceiverActivity" activity. The issue was discovered and disclosed on September 27, 2023, affecting Google Android versions 12.0 through 13.0 and LG V60 ThinQ 5G devices (NVD).
The vulnerability allows an attacker to forward attacker-controlled intents back to themselves through the exported QClipIntentReceiverActivity. The attack vector involves launching this activity and sending a broadcast with the "com.lge.message.action.QCLIP" action. The attacker can manipulate their own data/clipdata and set Intent.FLAGGRANT* flags. When the attacker receives the intent in the "onActivityResult()" method, they gain access to arbitrary content providers that have the android:grantUriPermissions="true" flag set. The vulnerability has been assigned a CVSS v3.1 base score of 3.3 (LOW) with vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N (NVD).
The vulnerability allows unauthorized access to content providers with grant URI permissions enabled, potentially leading to information disclosure. The impact is considered low severity but could result in unauthorized access to protected content (NVD).
LG has released security updates to address this vulnerability. Users should update their devices to the latest available security patch (LG Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."