Improper access control vulnerability in WindowManagerService prior to SMR Feb-2023 Release 1 allows attackers to take a screen capture.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Android | Samsung | 13.0 (including) | 13.0 (including) |
Android | Samsung | 13.0-smr-apr-2023-r1 (including) | 13.0-smr-apr-2023-r1 (including) |
Android | Samsung | 13.0-smr-aug-2023-r1 (including) | 13.0-smr-aug-2023-r1 (including) |
Android | Samsung | 13.0-smr-dec-2022-r1 (including) | 13.0-smr-dec-2022-r1 (including) |
Android | Samsung | 13.0-smr-dec-2023-r1 (including) | 13.0-smr-dec-2023-r1 (including) |
Android | Samsung | 13.0-smr-feb-2023-r1 (including) | 13.0-smr-feb-2023-r1 (including) |
Android | Samsung | 13.0-smr-jul-2023-r1 (including) | 13.0-smr-jul-2023-r1 (including) |
Android | Samsung | 13.0-smr-jun-2023-r1 (including) | 13.0-smr-jun-2023-r1 (including) |
Android | Samsung | 13.0-smr-mar-2023-r1 (including) | 13.0-smr-mar-2023-r1 (including) |
Android | Samsung | 13.0-smr-may-2023-r1 (including) | 13.0-smr-may-2023-r1 (including) |
Android | Samsung | 13.0-smr-nov-2022-r1 (including) | 13.0-smr-nov-2022-r1 (including) |
Android | Samsung | 13.0-smr-nov-2023-r1 (including) | 13.0-smr-nov-2023-r1 (including) |
Android | Samsung | 13.0-smr-oct-2022-r1 (including) | 13.0-smr-oct-2022-r1 (including) |
Android | Samsung | 13.0-smr-oct-2023-r1 (including) | 13.0-smr-oct-2023-r1 (including) |
Android | Samsung | 13.0-smr-sep-2023-r1 (including) | 13.0-smr-sep-2023-r1 (including) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.