The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a valid broadcast intent encrypted with a hardcoded RSA key pair
References
Link | Resource |
---|---|
https://psirt.bosch.com/security-advisories/BOSCH-SA-175607.html | Mitigation Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: bosch
Published: 2023-10-25T14:13:34.827Z
Updated: 2023-10-25T14:13:34.827Z
Reserved: 2023-10-18T09:35:22.507Z
Link: CVE-2023-41372
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-10-25T18:17:30.917
Modified: 2023-11-06T15:05:29.427
Link: CVE-2023-41372
JSON object: View
Redhat Information
No data.
CWE