2024-06-13 21:02:00
Google_Devices
PUBLISHED
There is a possible escalation of privilege due to improperly used crypto. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.