2024-03-11 18:55:34
Google_Devices
PUBLISHED
there is a possible Authentication Bypass due to improperly used crypto. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.