First published: Mon Jun 05 2023(Updated: )
In btm_sec_encrypt_change of btm_sec.cc, there is a possible way to downgrade the link key type due to improperly used crypto. This could lead to paired device escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-12 Android-12LAndroid ID: A-258834033
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Google Android | =12.1 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21115 has a high severity due to the potential for privilege escalation without user interaction.
To mitigate CVE-2023-21115, ensure that your Android device is updated to the latest security patch that addresses this vulnerability.
CVE-2023-21115 affects Android versions 11.0, 12.0, and 12.1.
No, CVE-2023-21115 does not require user interaction for exploitation but involves pairing with a vulnerable device.
Users potentially face unauthorized privilege escalation on paired devices, which could compromise device security.