{"uuid": "f75358ff-a72e-4fae-8624-0b5e3d69c941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-20963", "type": "seen", "source": "https://t.me/DaleelCyberSecurity/80", "content": "\u0645\u0627 \u0647\u064a \u062b\u063a\u0631\u0629 \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 (Zero-Day Exploit)\u061f\n\n\u0647\u064a \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u063a\u064a\u0631 \u0645\u0639\u0631\u0648\u0641\u0629 \u0644\u0644\u0645\u0637\u0648\u0631\u064a\u0646 \u0623\u0648 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0627\u0644\u0645\u0633\u0624\u0648\u0644\u0629 \u0639\u0646 \u0627\u0644\u0646\u0638\u0627\u0645\u060c \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u0623\u0646\u0647\u0627 \u0644\u0645 \u062a\u064f\u0635\u0644\u062d \u0628\u0639\u062f \u0648\u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0642\u0628\u0644 \u0623\u0646 \u064a\u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0623\u0648 \u0625\u0635\u062f\u0627\u0631 \u062a\u062d\u062f\u064a\u062b \u0644\u0647\u0627.\n\n\n---\n\n\u0643\u064a\u0641 \u062a\u0639\u0645\u0644\u061f\n\n\u0639\u0646\u062f \u0627\u0643\u062a\u0634\u0627\u0641 \u062b\u063a\u0631\u0629 \u062c\u062f\u064a\u062f\u0629\u060c \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0642\u0628\u0644 \u0623\u0646 \u062a\u0635\u062f\u0631 \u0627\u0644\u0634\u0631\u0643\u0629 \u062a\u0635\u062d\u064a\u062d\u064b\u0627 \u0623\u0645\u0646\u064a\u064b\u0627. \u064a\u062a\u0645 \u0630\u0644\u0643 \u0639\u0627\u062f\u0629\u064b \u0645\u0646 \u062e\u0644\u0627\u0644:\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0623\u062e\u0637\u0627\u0621 \u0628\u0631\u0645\u062c\u064a\u0629 \u0641\u064a \u0627\u0644\u0646\u0638\u0627\u0645 \u0623\u0648 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a.\n\n\u062a\u062c\u0627\u0648\u0632 \u0622\u0644\u064a\u0627\u062a \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u062b\u0644 SELinux \u0623\u0648 Google Play Protect.\n\n\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u062e\u0628\u064a\u062b\u0629 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0635\u0644\u0627\u062d\u064a\u0627\u062a \u0645\u0631\u062a\u0641\u0639\u0629 (Root \u0623\u0648 SYSTEM).\n\n\n\n---\n\n\u0643\u064a\u0641 \u064a\u0645\u0643\u0646 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f\u061f\n\n\u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f \u064a\u0645\u0643\u0646 \u0623\u0646 \u062a\u0643\u0648\u0646 \u0641\u064a \u0639\u062f\u0629 \u0623\u0645\u0627\u0643\u0646:\n\n1. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u0646\u0638\u0627\u0645 (Kernel Exploits):\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0623\u062e\u0637\u0627\u0621 \u0641\u064a \u0646\u0648\u0627\u0629 \u0627\u0644\u0646\u0638\u0627\u0645 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0635\u0644\u0627\u062d\u064a\u0627\u062a \u0645\u0631\u062a\u0641\u0639\u0629.\n\n\u0623\u0645\u062b\u0644\u0629: \u062b\u063a\u0631\u0629 Dirty Cow (CVE-2016-5195)\u060c \u0648\u062b\u063a\u0631\u0627\u062a \u062a\u062c\u0627\u0648\u0632 SELinux.\n\n\n\n2. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 (Framework Exploits):\n\n\u0627\u0633\u062a\u0647\u062f\u0627\u0641 \u0645\u0643\u0648\u0646\u0627\u062a \u0627\u0644\u0646\u0638\u0627\u0645 \u0645\u062b\u0644 MediaServer \u0623\u0648 WebView.\n\n\u062a\u0646\u0641\u064a\u0630 \u0623\u0643\u0648\u0627\u062f \u062e\u0628\u064a\u062b\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0645\u0644\u0641\u0627\u062a PDF \u0623\u0648 MP4 \u0623\u0648 \u0635\u0648\u0631 \u0645\u0634\u0648\u0647\u0629.\n\n\n\n3. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d\u0627\u062a (Browser Exploits):\n\n\u062a\u0646\u0641\u064a\u0630 \u0623\u0643\u0648\u0627\u062f \u062c\u0627\u0641\u0627\u0633\u0643\u0631\u064a\u0628\u062a \u062e\u0628\u064a\u062b\u0629 \u0645\u0646 \u062e\u0644\u0627\u0644 WebView \u0623\u0648 Chrome.\n\n\u0627\u0633\u062a\u063a\u0644\u0627\u0644 JavaScript Engine \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062a\u0646\u0641\u064a\u0630 \u0643\u0648\u062f \u0639\u0646 \u0628\u0639\u062f (RCE).\n\n\n\n4. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u0625\u062f\u0627\u0631\u0629 \u0627\u0644\u0630\u0627\u0643\u0631\u0629 (Heap / Stack Exploits):\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u062a\u0642\u0646\u064a\u0627\u062a \u0645\u062b\u0644 Buffer Overflow \u0623\u0648 Use-After-Free \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062a\u062d\u0643\u0645 \u0643\u0627\u0645\u0644 \u0628\u0627\u0644\u062c\u0647\u0627\u0632.\n\n\n\n5. \u062b\u063a\u0631\u0627\u062a \u0641\u064a \u062e\u062f\u0645\u0627\u062a \u0627\u0644\u0646\u0638\u0627\u0645 (System Services Exploits):\n\n\u0645\u062b\u0644 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 ADB \u0641\u064a \u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u062a\u064a \u062a\u062a\u0631\u0643\u0647 \u0645\u0641\u0639\u0651\u0644\u064b\u0627.\n\n\n\n\n\n---\n\n\u0643\u064a\u0641 \u064a\u062d\u0635\u0644 \u0627\u0644\u0647\u0627\u0643\u0631\u0632 \u0639\u0644\u0649 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u061f\n\n\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u062a\u062d\u062f\u064a\u062b\u0627\u062a \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0644\u0644\u0628\u062d\u062b \u0639\u0646 \u062a\u063a\u064a\u064a\u0631\u0627\u062a \u064a\u0645\u0643\u0646 \u0639\u0643\u0633\u0647\u0627 \u0644\u0627\u0633\u062a\u0646\u062a\u0627\u062c \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\u0645\u0631\u0627\u062c\u0639\u0629 \u0627\u0644\u0643\u0648\u062f \u0627\u0644\u0645\u0635\u062f\u0631\u064a \u0644\u0623\u0646\u0638\u0645\u0629 \u0623\u0646\u062f\u0631\u0648\u064a\u062f \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631 (AOSP).\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Fuzzing \u0644\u0625\u0631\u0633\u0627\u0644 \u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0634\u0648\u0627\u0626\u064a\u0629 \u0644\u0627\u062e\u062a\u0628\u0627\u0631 \u0633\u0644\u0648\u0643 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a.\n\n\u0627\u0644\u0628\u062d\u062b \u0641\u064a \u0627\u0644\u062a\u0633\u0631\u064a\u0628\u0627\u062a \u0648\u0627\u0644\u0645\u0646\u062a\u062f\u064a\u0627\u062a \u0627\u0644\u0633\u0631\u064a\u0629 \u062d\u064a\u062b \u064a\u062a\u0645 \u0628\u064a\u0639 \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\n\n---\n\n\u0647\u0644 \u064a\u0645\u0643\u0646\u0646\u064a \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u062b\u063a\u0631\u0629 \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u061f\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u0628\u0627\u062d\u062b\u064b\u0627 \u0623\u0645\u0646\u064a\u064b\u0627\u060c \u064a\u0645\u0643\u0646\u0643 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0623\u062f\u0648\u0627\u062a \u0645\u062b\u0644 AFL\u060c Frida\u060c Ghidra\u060c IDA Pro \u0644\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0648\u0627\u0643\u062a\u0634\u0627\u0641 \u0627\u0644\u062b\u063a\u0631\u0627\u062a.\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u062a\u0631\u064a\u062f \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0641\u0642\u0637\u060c \u0641\u0645\u0639\u0638\u0645 \u062b\u063a\u0631\u0627\u062a Zero-Day \u062a\u0643\u0648\u0646 \u062e\u0627\u0635\u0629 \u0648\u064a\u062a\u0645 \u0628\u064a\u0639\u0647\u0627 \u0641\u064a \u0627\u0644\u0633\u0648\u0642 \u0627\u0644\u0633\u0648\u062f\u0627\u0621 \u0628\u0623\u0633\u0639\u0627\u0631 \u062a\u0628\u062f\u0623 \u0645\u0646 10,000$ \u0648\u0642\u062f \u062a\u0635\u0644 \u0625\u0644\u0649 \u0645\u0644\u064a\u0648\u0646 \u062f\u0648\u0644\u0627\u0631 (\u062e\u0627\u0635\u0629 \u062b\u063a\u0631\u0627\u062a iOS \u0648\u0623\u0646\u062f\u0631\u0648\u064a\u062f).\n\n\n\n---\n\n\u0623\u0634\u0647\u0631 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631 \u0641\u064a \u0623\u0646\u062f\u0631\u0648\u064a\u062f\n\nCVE-2019-2215: \u062b\u063a\u0631\u0629 \u062a\u062c\u0627\u0648\u0632 Kernel Sandbox.\n\nCVE-2020-0022: \u062b\u063a\u0631\u0629 Bluetooth RCE \u062a\u062a\u064a\u062d \u062a\u0646\u0641\u064a\u0630 \u0623\u0648\u0627\u0645\u0631 \u0639\u0646 \u0628\u0639\u062f.\n\nCVE-2023-20963: \u0627\u0633\u062a\u063a\u0644\u0627\u0644 Intent \u0644\u0644\u0647\u0631\u0648\u0628 \u0645\u0646 \u0627\u0644\u062d\u0645\u0627\u064a\u0629.\n\nCVE-2024-XXXX (\u062a\u064f\u0643\u062a\u0634\u0641 \u0628\u0627\u0633\u062a\u0645\u0631\u0627\u0631).\n\n\n\n---\n\n\u0643\u064a\u0641 \u062a\u062d\u0645\u064a \u0646\u0641\u0633\u0643\u061f\n\n\u062a\u062d\u062f\u064a\u062b \u0627\u0644\u0646\u0638\u0627\u0645 \u0648\u0627\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0628\u0627\u0633\u062a\u0645\u0631\u0627\u0631.\n\n\u062a\u0639\u0637\u064a\u0644 ADB \u0648 Debugging \u0639\u0646\u062f \u0639\u062f\u0645 \u0627\u0644\u062d\u0627\u062c\u0629 \u0625\u0644\u064a\u0647.\n\n\u062a\u062c\u0646\u0628 \u062a\u062d\u0645\u064a\u0644 \u062a\u0637\u0628\u064a\u0642\u0627\u062a APK \u0645\u0646 \u0645\u0635\u0627\u062f\u0631 \u063a\u064a\u0631 \u0645\u0648\u062b\u0648\u0642\u0629.\n\n\u0627\u0633\u062a\u062e\u062f\u0627\u0645 ROMs \u0645\u0639\u062f\u0644\u0629 \u0628\u0645\u064a\u0632\u0627\u062a \u0623\u0645\u0627\u0646 \u0625\u0636\u0627\u0641\u064a\u0629 \u0645\u062b\u0644 GrapheneOS \u0623\u0648 CalyxOS.\n\n\n\u0625\u0630\u0627 \u0643\u0646\u062a \u062a\u0631\u064a\u062f \u062a\u0639\u0644\u0645 \u0627\u0643\u062a\u0634\u0627\u0641 \u0623\u0648 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u062b\u063a\u0631\u0627\u062a \u064a\u0648\u0645 \u0627\u0644\u0635\u0641\u0631\u060c \u0623\u0646\u0635\u062d\u0643 \u0628\u062f\u0631\u0627\u0633\u0629 \u0647\u0646\u062f\u0633\u0629 \u0639\u0643\u0633\u064a\u0629 (Reverse Engineering) \u0648\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0644\u062e\u0628\u064a\u062b\u0629 (Malware Analysis).", "creation_timestamp": "2025-01-30T18:05:01.000000Z"}