CVE-2022-23835

** DISPUTED ** The Visual Voice Mail (VVM) application through 2022-02-24 for Android allows persistent access if an attacker temporarily controls an application that has the READ_SMS permission, and reads an IMAP credentialing message that is (by design) not displayed to the victim within the AOSP SMS/MMS messaging application. (Often, the IMAP credentials are usable to listen to voice mail messages sent before the vulnerability was exploited, in addition to new ones.) NOTE: some vendors characterize this as not a "concrete and exploitable risk."
References
Link Resource
https://www.kb.cert.org/vuls/id/383864 Third Party Advisory US Government Resource
https://gitlab.com/kop316/vvm-disclosure Exploit Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:visual_voice_mail_project:visual_voice_mail:*:*:*:*:*:android:*:*

Information

Published : 2022-02-24 20:15

Updated : 2022-03-10 08:38


NVD link : CVE-2022-23835

Mitre link : CVE-2022-23835


JSON object : View

CWE
CWE-668

Exposure of Resource to Wrong Sphere

Advertisement

dedicated server usa

Products Affected

visual_voice_mail_project

  • visual_voice_mail