CVE-2022-38983 The BT Hfp Client module has a Use-After-Free vulnerability that may lead to arbitrary code execution.
This vulnerability has been assigned Common Vulnerability Scoring System (CVSS) base score of 5.8.
vendors have been notified of this vulnerability. There are no
CVE-2022-39064 An attacker sending a single malformed IEEE 802.15.4 (Zigbee) frame makes the TRÅDFRI bulb blink and perform a factory reset.
This attack can be prevented by using only authorized devices to control the lights. An attacker would need to know the specific communication channel used
CVE-2022-41597 The phones have the fingerprint vulnerability. Successful exploitation may affect the fingerprint service.
A local attacker may access and control the smart phone or read personal data from it.
Smart Phone Components Affected by the Vulnerability
The vulnerability
CVE-2022-20429 The IAM deputy in CarSettings could possibly be bypassed to allow local escalation of privilege in Bluetooth settings.
An attacker can send a malicious BTT message to trigger this issue. The attacker can launch the Bluetooth menu from a malicious app via a
CVE-2022-32590 An issue with wlan's status check could lead to local escalation of privilege with System execution privileges. User interaction is not needed for exploitation.
When sending a DHCP option, the values are validated against a hard-coded prefix. However, due to a missing validation check, it is possible to specify
Episode
00:00:00
00:00:00