{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-21156","assignerOrgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","assignerShortName":"google_android","dateUpdated":"2024-12-03T14:42:06.288Z","dateReserved":"2022-11-03T00:00:00.000Z","datePublished":"2023-06-28T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","shortName":"google_android","dateUpdated":"2023-06-28T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"In BuildGetRadioNode of protocolmiscbulider.cpp, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the modem with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-264540759References: N/A"}],"affected":[{"vendor":"n/a","product":"Android","versions":[{"version":"Android kernel","status":"affected"}]}],"references":[{"url":"https://source.android.com/security/bulletin/pixel/2023-06-01"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"Information disclosure"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T09:28:25.731Z"},"title":"CVE Program Container","references":[{"url":"https://source.android.com/security/bulletin/pixel/2023-06-01","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-03T14:41:53.569533Z","id":"CVE-2023-21156","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-03T14:42:06.288Z"}}]}}