Google Android on Pixel Verified Boot Fingerprint privilege escalation


The most severe vulnerability in this section could enable a local attacker to bypass user interaction requirements in order to gain access to additional permissions.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s