CVE-2021-0981

In enqueueNotificationInternal of NotificationManagerService.java, there is a possible way to run a foreground service without showing a notification due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-191981182
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:43

Type Values Removed Values Added
References () https://source.android.com/security/bulletin/2022-07-01 - Patch, Vendor Advisory () https://source.android.com/security/bulletin/2022-07-01 - Patch, Vendor Advisory

28 Oct 2022, 13:56

Type Values Removed Values Added
CPE cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
References (MISC) https://source.android.com/security/bulletin/2022-07-01 - (MISC) https://source.android.com/security/bulletin/2022-07-01 - Patch, Vendor Advisory

13 Jul 2022, 19:15

Type Values Removed Values Added
Summary In enqueueNotificationInternal of NotificationManagerService.java, there is a possible way to run a foreground service without showing a notification due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12Android ID: A-191981182 In enqueueNotificationInternal of NotificationManagerService.java, there is a possible way to run a foreground service without showing a notification due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-191981182
References
  • {'url': 'https://source.android.com/security/bulletin/pixel/2021-12-01', 'name': 'https://source.android.com/security/bulletin/pixel/2021-12-01', 'tags': ['Patch', 'Vendor Advisory'], 'refsource': 'MISC'}
  • (MISC) https://source.android.com/security/bulletin/2022-07-01 -

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-269 NVD-CWE-Other

17 Dec 2021, 18:09

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8
CWE CWE-269
CPE cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
References (MISC) https://source.android.com/security/bulletin/pixel/2021-12-01 - (MISC) https://source.android.com/security/bulletin/pixel/2021-12-01 - Patch, Vendor Advisory

15 Dec 2021, 19:20

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-15 19:15

Updated : 2024-11-21 05:43


NVD link : CVE-2021-0981

Mitre link : CVE-2021-0981

CVE.ORG link : CVE-2021-0981


JSON object : View

Products Affected

google

  • android