First published: Mon Dec 02 2024(Updated: )
In RsaKeyPairGenerator::getNumberOfIterations of RSAKeyPairGenerator.java, an incorrect implementation could cause weak RSA key pairs being generated. This could lead to crypto vulnerability with no additional execution privileges needed. User interaction is not needed for exploitation. Bulletin Fix: The fix is designed to correctly implement the key generation according to FIPS standard.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =7.0 | |
Android | =7.1.1 | |
Android | =7.1.2 | |
Android | =8.0 | |
Android | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-9426 has a severity rating of moderate due to the potential generation of weak RSA key pairs.
To fix CVE-2018-9426, users should update their Android devices to the latest available version that addresses this vulnerability.
CVE-2018-9426 affects Android versions 7.0, 7.1.1, 7.1.2, 8.0, and 8.1.
Exploitation of CVE-2018-9426 could lead to the use of weak RSA key pairs, compromising cryptographic security.
No, user interaction is not required for the exploitation of CVE-2018-9426.