It is possible for a malicious application to construct a TYPE_TOAST window manually and make that window clickable. This could lead to a local escalation of privilege with no additional execution privileges needed. User action is needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-128674520
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/2020-02-01 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: google_android
Published: 2020-02-13T14:20:09
Updated: 2020-02-13T14:20:09
Reserved: 2019-10-17T00:00:00
Link: CVE-2020-0014
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-13T15:15:11.233
Modified: 2020-02-19T14:57:35.300
Link: CVE-2020-0014
JSON object: View
Redhat Information
No data.
CWE