In BTM_BleVerifySignature of btm_ble.cc, there is a possible way to bypass signature validation due to side channel information disclosure. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
References
| Link | Resource |
|---|---|
| https://android.googlesource.com/platform/packages/modules/Bluetooth/+/495417bd068c35de0729d9a332639bd0699153ff | Mailing List Patch |
| https://source.android.com/security/bulletin/2023-12-01 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
02 Feb 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://android.googlesource.com/platform/packages/modules/Bluetooth/+/495417bd068c35de0729d9a332639bd0699153ff - Mailing List, Patch | |
| References | () https://source.android.com/security/bulletin/2023-12-01 - Patch, Third Party Advisory |
Information
Published : 2023-12-04 23:15
Updated : 2024-02-02 03:15
NVD link : CVE-2023-40090
Mitre link : CVE-2023-40090
CVE.ORG link : CVE-2023-40090
JSON object : View
Products Affected
- android
CWE
CWE-203
Observable Discrepancy
