** DISPUTED ** The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a "concrete and exploitable risk."
References
Link | Resource |
---|---|
https://www.kb.cert.org/vuls/id/383864 | Third Party Advisory US Government Resource |
https://gitlab.com/kop316/vvm-disclosure | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-02-24 20:15
Updated : 2022-03-10 08:38
NVD link : CVE-2022-23835
Mitre link : CVE-2022-23835
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
visual_voice_mail_project
- visual_voice_mail