FAQ
What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires a user to first turn on the Mobile Hotspot before the attacker starts the exploitation.
FAQ
According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with guest/low privileges must first gain access to the local system, then wait for or trick the user into turning on the Mobile Hotspot feature. Only when the Mobile Hotspot is turned on does the vulnerability become exploitable. Therefore, this attack vector requires both attacker authentication (to access the local system) and user interaction (to turn on the Mobile Hotspot).