In checkDebuggingDisallowed of DeviceVersionFragment.java, there is a possible way to access adb before SUW completion due to an insecure default value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/wear/2023-08-01 | Broken Link |
https://source.android.com/security/bulletin/wear/2023-08-01 | Broken Link |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://source.android.com/security/bulletin/wear/2023-08-01 - Broken Link |
22 Aug 2023, 01:10
Type | Values Removed | Values Added |
---|---|---|
First Time |
Google android
|
|
References | (MISC) https://source.android.com/security/bulletin/wear/2023-08-01 - Broken Link | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:* |
|
CWE | CWE-1188 |
14 Aug 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-14 22:15
Updated : 2024-11-21 08:08
NVD link : CVE-2023-35689
Mitre link : CVE-2023-35689
CVE.ORG link : CVE-2023-35689
JSON object : View
Products Affected
- android
CWE
CWE-1188
Insecure Default Initialization of Resource