First published: Fri Jan 14 2022(Updated: )
The broadcast that DevicePickerFragment sends when a new device is paired doesn't have any permission checks, so any app can register to listen for it. This lets apps keep track of what devices are paired without requesting BLUETOOTH permissions.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-162951906
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =9.0 | |
Android | =10.0 | |
Android | =11.0 | |
Android | =12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1037 is categorized as a high severity vulnerability due to the lack of permission checks allowing unauthorized access to paired device information.
To fix CVE-2021-1037, ensure that your Android device is updated to the latest version that includes the security patch addressing this vulnerability.
CVE-2021-1037 affects Android versions 9.0, 10.0, 11.0, and 12.0.
CVE-2021-1037 allows malicious apps to listen for broadcasts sent by DevicePickerFragment, enabling them to track paired devices without requiring Bluetooth permissions.
Mitigation for CVE-2021-1037 involves keeping your Android device updated and reviewing app permissions for any apps requesting Bluetooth access.