fkie_cve-2023-21471
Vulnerability from fkie_nvd
Published
2025-09-03 06:15
Modified
2025-09-05 16:46
Severity ?
4.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
3.3 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Improper access control vulnerability in SemClipboard prior to SMR Apr-2023 Release 1 allows attackers to read arbitrary files with system permission.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 12.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 | |
samsung | android | 13.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12", "vulnerable": true }, { "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control vulnerability in SemClipboard prior to SMR Apr-2023 Release 1 allows attackers to read arbitrary files with system permission." } ], "id": "CVE-2023-21471", "lastModified": "2025-09-05T16:46:21.070", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 1.4, "source": "mobile.security@samsung.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-09-03T06:15:40.293", "references": [ { "source": "mobile.security@samsung.com", "tags": [ "Vendor Advisory" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2023\u0026month=04" } ], "sourceIdentifier": "mobile.security@samsung.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…