For example, if an attacker has administrator rights in the phone, he/she can read all the messages in the contact list with no additional permissions.
It is also possible to edit contacts messages. For example, if an attacker has administrator rights in the phone, he/she can delete contact with no additional permissions.
It is possible to view contact details. For example, if an attacker has administrator rights in the phone, he/she can change contact address with no additional permissions.
It is possible to send messages. For example, if an attacker has administrator rights in the phone, he/she can send messages to anyone with no additional permissions.
It is possible to read contact details. For example, if an attacker has administrator rights in the phone, he/she can read contact address with no additional permissions.
It is possible to view contact photos. For example, if an attacker has administrator rights in the phone, he/she can view contact photo with no additional permissions.
It is possible to view contact notes. For example, if an attacker has administrator rights in the phone, he/she can view contact note with no additional permissions.
It is possible to view contact attachments. For example, if an attacker has administrator rights in the phone, he/she can view contact attachment with no additional permissions.
It is possible to view contact call history. For example, if an attacker has administrator rights in the phone, he
Solution:
If you want to avoid the vulnerability, uninstall the application and uninstall it from your phone as well.
Timeline
Published on: 10/14/2022 19:15:00 UTC
Last modified on: 10/18/2022 17:48:00 UTC