First published: Fri Sep 09 2022(Updated: )
Improper restriction of broadcasting Intent in GalaxyStoreBridgePageLinker of?Waterplugin prior to version 2.2.11.22081151 leaks MAC address of the connected Bluetooth device.
Credit: mobile.security@samsung.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Galaxy Watch Plugin | <2.2.11.22081151 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36873 has a medium severity level due to its potential to leak sensitive information, specifically the MAC address of connected Bluetooth devices.
To fix CVE-2022-36873, update the Galaxy Watch Plugin to version 2.2.11.22081151 or higher.
CVE-2022-36873 affects the Samsung Galaxy Watch Plugin versions prior to 2.2.11.22081151 on Android devices.
CVE-2022-36873 affects the broadcasting Intent mechanism in the GalaxyStoreBridgePageLinker of the Galaxy Watch Plugin.
CVE-2022-36873 can expose the MAC address of the Bluetooth device, potentially leading to privacy concerns but does not allow unauthorized access.