Mmd 紳士 保管。 YouTube
。 。 。 。 。 。
- Severity Rating Consequence of successful exploitation Critical High Moderate Low No Security Impact NSI Rating modifiers Reason Effect Requires running as a privileged process to execute the attack -1 Severity Vulnerability-specific details limit the impact of the issue -1 Severity Compiler or platform configurations mitigate a vulnerability in the source code Moderate Severity if the underlying vulnerability is Moderate or higher Requires physical access to device internals and is still possible if the phone is off or hasn't been unlocked since being powered on -1 Severity Requires physical access to device internals while the phone is on and has previously been unlocked -2 Severity A local attack that requires the bootloader to be unlocked No higher than Low A local attack that requires Developer Mode or any persistent developer mode settings to be enabled on the device and isn't a bug in Developer Mode. OR A process that's significantly more limited than a normal app. OR An app or process with important privileges that a third-party app can't obtain. OR A built-in hardware component on the device that isn't part of the trusted computing base TCB. Local versus remote Wi-Fi security Caution: It's considered a vulnerability if an attacker can bypass Wi-Fi authentication, allowing them to use up device bandwidth or gain unauthorized network access. Bootloader A component that configures the device on boot and then passes control to the Android OS. No higher than Low If no SELinux domain can conduct the operation under the Google-provided SEPolicy No Security Impact Note: A CVE may not be issued for issues assessed as Low or NSI. Unprivileged process A third-party app or process. Trusted Execution Environment TEE A component that is designed to be protected from even a hostile kernel. Secure element SE An optional component designed to be protected from all other components on the device and from physical attack, as defined in. Trusted computing base TCB Functionality that's part of the kernel, runs in the same CPU context as the kernel such as device drivers , has direct access to kernel memory such as hardware components on the device , has the capability to load scripts into a kernel component for example, eBPF , the Baseband Processor, or is one of a handful of user services that is considered kernel equivalent: init, ueventd, and vold.