SHARP AQUOS series (AQUOS SH-M02 build number 01.00.05 and earlier, AQUOS SH-RM02 build number 01.00.04 and earlier, AQUOS mini SH-M03 build number 01.00.04 and earlier, AQUOS Keitai SH-N01 build number 01.00.01 and earlier, AQUOS L2 (UQ mobile/J:COM) build number 01.00.05 and earlier, AQUOS sense lite SH-M05 build number 03.00.04 and earlier, AQUOS sense (UQ mobile) build number 03.00.03 and earlier, AQUOS compact SH-M06 build number 02.00.02 and earlier, AQUOS sense plus SH-M07 build number 02.00.02 and earlier, AQUOS sense2 SH-M08 build number 02.00.05 and earlier, and AQUOS sense2 (UQ mobile) build number 02.00.06 and earlier) allow an attacker to obtain the sensitive information of the device via malicious applications installed on the device.
References
Link | Resource |
---|---|
https://jvn.jp/en/jp/JVN93064451/index.html | Third Party Advisory |
https://k-tai.sharp.co.jp/support/info/info036.html | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: jpcert
Published: 2020-04-23T07:40:15
Updated: 2020-04-23T07:40:15
Reserved: 2020-01-06T00:00:00
Link: CVE-2020-5571
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-04-23T08:15:12.067
Modified: 2020-04-30T19:48:51.093
Link: CVE-2020-5571
JSON object: View
Redhat Information
No data.
CWE