CVE-2023-21471
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-09-03
Last updated on: 2025-09-05
Assigner: Samsung Mobile
Description
Description
Improper access control vulnerability in SemClipboard prior to SMR Apr-2023 Release 1 allows attackers to read arbitrary files with system permission.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 12.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
| samsung | android | 13.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper access control issue in SemClipboard before the SMR Apr-2023 Release 1. It allows attackers to read arbitrary files with system-level permissions, meaning unauthorized users can access files they should not be able to.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing attackers to read sensitive or confidential files on your system without authorization, potentially leading to information disclosure or privacy breaches.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70